It is correct, it works, did you check the link I posted, or look at shinyquagsire23's code? There is a large amount of overlap. The Old3DS 5.1-6.x and 7.2 offset is identical, as are the 5.0 and 7.0 offset. Additionally, as I found out by looking at 3dbrew and outlined above the 8.0-9.2 patch offset for AXIWRAM are the same on both New and old 3ds. This is because the virtual memory addresses are mapped from dff00000 to e0000000 for these system software versions.noooooooooooooonononononono. Just because the kernel is loaded to the same location in memory doesn't mean its offsets are the same. N3DS has its own NATIVE_FIRM because there's a bunch of new stuff the system has to do. Thus, every single specific patch offset for 9.x old 3DS will differ.
You should be getting your offsets from N3DS NATIVE_FIRM, not conjecture. You can grab it from NUS and decrypt it with an exploitable old 3DS. It's like super duper critical that you familiarize yourself with the NATIVE_FIRM of the system and sw version you're trying to hack. If you plan on doing almost everything you mentioned wanting to do, you're going to need to map out quite a few things in Process9 in order to make patches.
Edit: Ah, I think I may see your confusion? We are not doing anything to FIRM at the moment, that comes later, we are just exploiting the Arm11 kernel for now.
Edited to remove frostiness, sorry