NVMe Driver Patcher for Windows 11
A GUI + CLI tool to enable the experimental Windows Server 2025 Native NVMe driver (nvmedisk.sys) on Windows 11, replacing the legacy SCSI translation layer for improved NVMe performance.

Quick Start
One-line install (Run as Administrator in PowerShell):
irm https://github.com/SysAdminDoc/win11-nvme-driver-patcher/releases/latest/download/NVMe_Driver_Patcher.ps1 -OutFile NVMe_Driver_Patcher.ps1; .\NVMe_Driver_Patcher.ps1
Or download NVMe_Driver_Patcher.ps1 from Releases and right-click > Run with PowerShell.
Verify the download (recommended)
Every release artifact ships with a matching <asset>.sha256 sidecar and a combined
SHA256SUMS.txt. Verify before running — this catches a tampered CDN, a corrupted
download, or a masquerading file under the same name:
# Verify any single artifact against its .sha256 sidecar
$file = 'NVMe_Driver_Patcher.ps1'
$expected = (Invoke-WebRequest -UseBasicParsing -Uri "https://github.com/SysAdminDoc/win11-nvme-driver-patcher/releases/latest/download/$file.sha256").Content.Split(' ')[0].Trim()
$actual = (Get-FileHash -Algorithm SHA256 -Path $file).Hash.ToLower()
if ($expected -eq $actual) { "OK: $file" } else { "MISMATCH: expected $expected, got $actual" }
The GUI's in-app auto-updater (Help → Check for updates) performs the same SHA-256 sidecar check automatically and refuses to stage any binary that either fails the hash or has no sidecar / Authenticode signature available — this is load-bearing supply-chain defense, not just UI polish.
What Does This Do?
Windows Server 2025 introduced a new Native NVMe driver that eliminates the legacy SCSI translation layer, allowing direct communication with NVMe drives. This driver is available in Windows 11 (24H2+) but disabled by default. Microsoft has stated they are "absolutely exploring" bringing it broadly to the entire Windows codebase.
This tool enables it via 5 registry components:
| Component | Purpose |
|---|---|
Feature Flag 735209102 |
NativeNVMeStackForGeClient - Primary driver enable |
Feature Flag 1853569164 |
UxAccOptimization - Extended functionality |
Feature Flag 156965516 |
Standalone_Future - Performance optimizations |
| SafeBoot Minimal Key | Prevents INACCESSIBLE_BOOT_DEVICE BSOD in Safe Mode |
| SafeBoot Network Key | Safe Mode with Networking support |
Optional: Feature Flag 1176759950 (Microsoft Official Server 2025 key) can be included via checkbox. Recommended -- without it, the new I/O scheduler may not activate and results can be inconsistent.
Important: The SafeBoot keys are critical. Without them, your system cannot boot into Safe Mode after enabling Native NVMe. Many manual guides omit these keys -- this tool includes them automatically.
Features
Safety & Compatibility
- VeraCrypt hard block -- detects system encryption and refuses to patch (breaks boot entirely)
- Automatic BitLocker suspension -- suspends BitLocker for one reboot cycle to prevent recovery key prompts
- Comprehensive software detection -- warns about Intel RST (BSOD risk), Intel VMD (boot failures), Hyper-V/WSL2 (40% I/O regression), Storage Spaces (array degradation), Veeam, Acronis, Macrium, Samsung Magician, WD Dashboard, Crucial Storage Executive, Data Deduplication
- Laptop/power warning -- detects laptops and warns about APST battery regression (~15% impact)
- Rollback on partial failure -- undoes all applied registry keys if patch doesn't complete fully
- Registry backup export + system restore point creation before any changes
- Third-party driver detection (Samsung, WD, Intel RST, AMD, SK Hynix, Crucial, Phison)
- Recovery Kit generation -- creates .reg + .bat files for offline WinRE recovery (auto-detects WinRE, loads offline registry hive)
Diagnostics & Benchmarking
- Built-in DiskSpd benchmark -- 4K random read/write test targeting NVMe drive with before/after comparison (auto-downloads Microsoft DiskSpd)
- 11 async preflight checks run in a background thread without freezing the GUI
- NVMe health badges -- temperature, wear %, firmware, power-on hours, media errors (hover for SMART details)
- Per-drive NATIVE/LEGACY badges -- shows whether each NVMe drive migrated to
nvmedisk.sysor remains onstornvme.sys - Post-reboot drive migration verification -- per-drive confirmation of which drives moved to "Storage disks"
- BypassIO/DirectStorage status check with gaming impact warning
- Before/after comparison -- shows exactly what changed after patch/unpatch
- Diagnostics export -- full system report with SMART health, compat software, migration status, benchmark history
- GitHub update check with clickable badge in title bar
- Windows Event Log integration for audit trails
UI/UX
- WPF dark theme -- zinc-950 palette with blue accent, custom title bar, drop shadow
- Resizable window with grip handle, clamped to work area (no off-screen at high DPI)
- Toast notifications -- Windows balloon tips for patch results
- Activity log with right-click context menu (Copy Selection, Select All, Copy All, Clear)
- Collapsible Settings panel -- Auto-save, Toasts, Event Log, Restart Delay, Open Data Folder
- Benchmark IOPS display in patch status card
- Refresh button -- re-run all preflight checks without restarting
- Skip warnings checkbox -- for experienced users who don't need confirmation dialogs
- Silent/CLI mode for scripting and automation
v4.4 — Stability, correlation, enterprise (new)
- Post-patch event-log watchdog -- scans
Systemchannel for Storport ID 129, disk ID 51/153, Kernel-Power 41, and BugCheck 1001 inside a configurable window (default 48h). Crosses the revert threshold? Stages an auto-revert on next boot. - Reliability Monitor correlation -- pulls
Win32_ReliabilityStabilityMetrics, overlays the patch-apply timestamp, reports pre/post stability averages with delta. - Minidump triage -- scans
C:\Windows\Minidumpfor dumps newer than the patch and flags any that referencenvmedisk.sys,stornvme.sys,storport.sys,disk.sys. - Firmware + controller compat JSON -- shipped
compat.jsonmaps{controller, firmware}→{Good, Caution, Bad}. Preflight consults it before proceeding. - Per-drive scope -- exclude specific NVMe drives from the swap by serial or model pattern (e.g. keep a DirectStorage gaming drive on
stornvme.syswhile the OS drive moves tonvmedisk.sys). - Dry-run preview (
--dry-run/ "Preview Changes") -- prints every registry write the patch would perform, without touching the registry. - ETW storage trace (
etw) -- wrapswpr.exefor 60-second pre/post captures; ETL files land in%LocalAppData%\NVMePatcher\etl\. - WinPE recovery USB builder (
winpe) -- detects the Windows ADK + WinPE add-on and produces a bootable tree/ISO with the Recovery Kit pre-staged and a customstartnet.cmd. - Opt-in compatibility telemetry -- build an anonymized
{controller, firmware, OS build, profile, verification, watchdog, reliability delta}JSON and optionallyPOSTit to a user-configured HTTPS endpoint. No serials, machine names, drive letters, or user names. - Driver Verifier harness (
verifier-on/-off/-status) -- dev/tester-mode wrapper aroundverifier.exefor kernel-level stress checks on the NVMe stack. - GPO / ADMX templates (
packaging/admx/) -- pin Safe/Full profile, IncludeServerKey, SkipWarnings, watchdog behavior, and telemetry across a fleet viaHKLM\SOFTWARE\Policies\SysAdminDoc\NVMeDriverPatcher. Policy overrides local config. - winget manifest (
packaging/winget/SysAdminDoc.NVMeDriverPatcher.yaml) --winget install SysAdminDoc.NVMeDriverPatcher. - Non-admin status tray agent (
NVMeDriverPatcher.Tray) -- separate exe, no UAC. Shows patch state + watchdog verdict from the system tray; right-click → "Open Main App (elevated)" for the admin GUI. - Rotating logs --
crash.log,activity.log,watchdog.log,diagnostics.logrotate at 5MB each with 5 generations retained.
CLI Usage
All CLI operations require Administrator privileges.
# Check patch status (exit code: 0=applied, 1=not applied, 2=partial)
# Shows driver status, migration, compat warnings, laptop detection
.\NVMe_Driver_Patcher.ps1 -Silent -Status
# Apply the patch silently without restart prompt
.\NVMe_Driver_Patcher.ps1 -Silent -Apply -NoRestart
# Apply with force (skip NVMe drive check and preflight)
.\NVMe_Driver_Patcher.ps1 -Silent -Apply -Force
# Remove the patch silently
.\NVMe_Driver_Patcher.ps1 -Silent -Remove
# Export system diagnostics report
.\NVMe_Driver_Patcher.ps1 -ExportDiagnostics
# Generate post-reboot verification script
.\NVMe_Driver_Patcher.ps1 -GenerateVerifyScript
# Generate WinRE-compatible recovery kit
.\NVMe_Driver_Patcher.ps1 -ExportRecoveryKit
Extended CLI (v4.4, C# CLI binary)
# Preview every registry change without touching the system
NVMeDriverPatcher.Cli apply --dry-run
# Read the post-patch watchdog verdict (exit: 0=healthy, 1=unstable, 2=warning)
NVMeDriverPatcher.Cli watchdog
# Correlate Reliability Monitor stability index with the patch timestamp
NVMeDriverPatcher.Cli reliability
# Scan C:\Windows\Minidump for NVMe-stack crashes since the patch
NVMeDriverPatcher.Cli minidump
# List bundled controller/firmware compat entries (compat.json)
NVMeDriverPatcher.Cli firmware
# Show per-drive include/exclude decisions from drive_scope.json
NVMeDriverPatcher.Cli scope
# Capture a 60s ETW storage trace via wpr.exe
NVMeDriverPatcher.Cli etw
# Build a WinPE recovery USB tree/ISO from the current Recovery Kit
NVMeDriverPatcher.Cli winpe --output=E:\
# Build (and optionally submit) the anonymized compat report
NVMeDriverPatcher.Cli telemetry --endpoint=https://example.com/nvme/compat
# Driver Verifier harness (dev testing; requires reboot)
NVMeDriverPatcher.Cli verifier-on
NVMeDriverPatcher.Cli verifier-status
NVMeDriverPatcher.Cli verifier-off
Exit Codes (Silent Mode):
| Code | Meaning |
|---|---|
| 0 | Success / Patch Applied |
| 1 | Failure / Patch Not Applied |
| 2 | Partial / No NVMe drives |
| 3 | Invalid parameters |
| 4 | Elevation required |
Requirements
| Requirement | Details |
|---|---|
| OS | Windows 11 Build 22000+ (24H2 or 25H2 recommended) |
| Privileges | Administrator (auto-elevation prompt) |
| Hardware | NVMe SSD using Windows inbox driver (StorNVMe.sys) |
| Update | KB5066835 (October 2025 cumulative update) or newer |
Windows Version Compatibility
| Windows 11 Version | Build | Support |
|---|---|---|
| 25H2 | 26200+ | Full support, best performance |
| 24H2 | 26100 | Full support, recommended minimum |
| 23H2 | 22631 | Partial -- feature flags apply but driver may not activate |
| 22H2 | 22621 | Not recommended -- driver not present in base image |
| 21H2 | 22000 | Unsupported |
The tool will warn you if your build is below 26100 but will not block the patch.
Hardware Compatibility
The patch works with any NVMe drive using the Windows inbox StorNVMe.sys driver. Drives using vendor-specific drivers are unaffected.
Confirmed working:
| Brand | Models |
|---|---|
| Samsung | 970 Evo/Plus, 980, 980 Pro, 990 Pro (when using inbox driver) |
| WD | SN570, SN580, SN770, SN850X (when using inbox driver) |
| Crucial | P3, P3 Plus, P5, P5 Plus, T705 |
| SK Hynix | Platinum P41, Gold P31 |
| Kingston | NV2, KC3000 |
| Sabrent | Rocket 4 Plus |
| Solidigm | P5316 (enterprise, Server 2025 tested) |
| Generic/OEM | Any drive using StorNVMe.sys |
Not compatible (uses vendor driver by default):
| Brand | Notes |
|---|---|
| Samsung (with Samsung NVMe Driver) | Uses samsungnvmedriver.sys -- patch has no effect |
| WD (with WD Dashboard driver) | Uses proprietary driver |
To check which driver your drive uses: Device Manager > Disk drives > [Your NVMe] > Properties > Driver > Driver Files
Performance Benchmarks
The native NVMe driver delivers significant gains by eliminating the SCSI translation layer. Results vary by SSD model, controller, and workload type.
Independent Benchmark Results
| Source | Test | Improvement |
|---|---|---|
| Tom's Hardware | 4K random read (StorageReview) | +64.89% |
| Tom's Hardware | Random workloads (consumer SSD) | Up to +85% |
| StorageReview | 64K random read latency | -38.46% (faster) |
| NotebookCheck | Sequential read / write (PCIe 4.0) | +23% / +30% |
| Microsoft | 4K random read IOPS (Server) | +80%, -45% CPU |
| Overclock.net | IOPS 512b-8KB (Samsung OEM) | +167% |
| CrystalDiskMark (Reddit) | 4K-64Thrd random read/write | +22% / +85% |
What to Expect
| Workload | Expected Gains |
|---|---|
| Random 4K read/write (high queue depth) | +20% to +85% -- biggest wins |
| Sequential read/write | +10% to +30% |
| Desktop responsiveness (app launches, boot) | Noticeable improvement |
| Gaming (load times) | Minimal difference |
| DirectStorage games | May be worse (BypassIO not supported) |
The biggest gains are in high-queue-depth random I/O. Sequential transfers and gaming see more modest improvements. Desktop usage operates at QD1-2 where gains are ~2%. Run your own benchmarks with the built-in DiskSpd or CrystalDiskMark before and after.
Known Compatibility Issues
The tool automatically detects and warns about all of these. VeraCrypt is a hard block.
| Software | Issue | Severity | Auto-Detected |
|---|---|---|---|
| VeraCrypt (system encryption) | Breaks boot entirely | Critical | Yes (blocks patch) |
| BitLocker | May trigger recovery key prompt | High | Yes (auto-suspends) |
| Intel RST | Conflicts with nvmedisk.sys, BSOD risk | High | Yes (warns) |
| Intel VMD | Boot failures on VMD-configured systems | High | Yes (warns) |
| Hyper-V / WSL2 | WSL2 disk I/O ~40% slower (no paravirt) | Medium | Yes (warns) |
| Storage Spaces | Arrays may degrade or disappear | High | Yes (warns) |
| Acronis True Image | Drives invisible to backup/restore | High | Yes (warns) |
| Veeam Backup | Cannot detect drives | High | Yes (warns) |
| Macrium Reflect | May need update for compatibility | Medium | Yes (warns) |
| Samsung Magician | Cannot detect drives (SCSI pass-through) | Low | Yes (warns) |
| WD Dashboard | Cannot detect drives (SCSI pass-through) | Low | Yes (warns) |
| Crucial Storage Executive | Cannot detect drives (SCSI pass-through) | Low | Yes (warns) |
| Data Deduplication | Microsoft confirms incompatibility | High | Yes (warns) |
| Laptop / Battery | APST broken, ~15% battery life reduction | Medium | Yes (warns) |
| DirectStorage games | BypassIO not supported, higher CPU | Low-Medium | Yes (warns) |
If you experience problems, use the Remove Patch button (or -Silent -Remove) and restart.
Recovery Kit
The tool can generate a WinRE-compatible Recovery Kit -- a folder containing:
NVMe_Remove_Patch.reg-- double-click from Windows, orregedit /sfrom WinRERemove_NVMe_Patch.bat-- smart batch script that auto-detects WinRE vs Windows, finds your Windows installation, loads the offline SYSTEM hive, and removes the patch from all ControlSetsREADME.txt-- step-by-step instructions for both Windows and WinRE recovery
A recovery kit is automatically generated after each successful patch installation. You can also create one manually via the RECOVERY KIT button or .\NVMe_Driver_Patcher.ps1 -ExportRecoveryKit.
Copy this folder to a USB drive before rebooting to have an offline recovery option if the system won't boot.
Scope
This patch affects ALL NVMe drives in your system that use the Windows inbox driver (StorNVMe.sys), not just the OS drive.
Exception: Drives using vendor-specific drivers (e.g., Samsung's proprietary driver) are not affected.
Troubleshooting
"No NVMe drives detected"
- Your drives may use vendor-specific drivers
- Check Device Manager > Disk drives > Properties > Driver
- If using Samsung/WD proprietary drivers, this patch won't help
System won't boot after patch
Option 1: Use the Recovery Kit (recommended)
- If you saved the Recovery Kit to USB before rebooting:
- Boot to WinRE (hold Shift + Restart, or use Windows install USB > "Repair")
- Open Command Prompt
- Navigate to USB (try
D:,E:,F:) - Run
NVMe_Recovery_Kit\Remove_NVMe_Patch.bat - Restart
Option 2: Manual WinRE removal
- Boot to WinRE > Troubleshoot > Advanced options > Command Prompt
- Load the offline registry:
reg load HKLM\OFFLINE C:\Windows\System32\config\SYSTEM
(If C: doesn't work, try D: or E: -- drive letters differ in WinRE) 3. Remove the patch:
for /L %N in (1,1,9) do reg delete "HKLM\OFFLINE\ControlSet00%N\Policies\Microsoft\FeatureManagement\Overrides" /v 735209102 /f
for /L %N in (1,1,9) do reg delete "HKLM\OFFLINE\ControlSet00%N\Policies\Microsoft\FeatureManagement\Overrides" /v 1853569164 /f
for /L %N in (1,1,9) do reg delete "HKLM\OFFLINE\ControlSet00%N\Policies\Microsoft\FeatureManagement\Overrides" /v 156965516 /f
for /L %N in (1,1,9) do reg delete "HKLM\OFFLINE\ControlSet00%N\Policies\Microsoft\FeatureManagement\Overrides" /v 1176759950 /f
for /L %N in (1,1,9) do reg delete "HKLM\OFFLINE\ControlSet00%N\Control\SafeBoot\Minimal\{75416E63-5912-4DFA-AE8F-3EFACCAFFB14}" /f
for /L %N in (1,1,9) do reg delete "HKLM\OFFLINE\ControlSet00%N\Control\SafeBoot\Network\{75416E63-5912-4DFA-AE8F-3EFACCAFFB14}" /f
reg unload HKLM\OFFLINE
- Restart
Option 3: Wait for auto-recovery Windows automatically disables the native NVMe driver after 2-3 consecutive failed boots and reverts to the legacy stack.
Can't boot into Safe Mode
This shouldn't happen if you used this tool (SafeBoot keys are included). If it does, follow the WinRE steps above.
SSD vendor tools stopped working
Samsung Magician, WD Dashboard, and Crucial Storage Executive use legacy SCSI pass-through to communicate with drives. The native NVMe driver doesn't implement this interface. Use Windows built-in tools (Device Manager, Get-PhysicalDisk, Get-StorageReliabilityCounter) for health monitoring instead, or remove the patch to restore compatibility.
Credits & Sources
- Microsoft TechCommunity -- Announcing Native NVMe in Windows Server 2025
- Tom's Hardware -- Native NVMe Driver Benchmarks: Up to 64.89% Gains
- Tom's Hardware -- Up to 85% Higher Random Workload Performance
- StorageReview -- Windows Server 2025 Native NVMe Benchmarks
- NotebookCheck -- Higher SSD Speeds with New Microsoft NVMe Driver
- Ghacks -- This Registry Hack Unlocks a Faster NVMe Driver in Windows 11
- XDA Developers -- Windows 11 Free NVMe Speed Boost
- Overclock.net -- Community Testing Thread
- Win-Raid Level1Techs -- Native NVMe Discussion
- VeraCrypt -- Issue #1640: Breaks boot with native NVMe driver
- 4sysops -- Windows Server 2025 Native NVMe Support
- StarWind -- Windows Server 2025 Native NVMe Support
- Thomas-Krenn Wiki -- Activation of Native NVMe Driver
Disclaimer
This tool modifies system registry settings to enable an experimental, unsupported feature on Windows 11. While safety measures are included (VeraCrypt detection, BitLocker auto-suspend, restore points, registry backups, rollback on failure, recovery kit generation), use at your own risk. The native NVMe driver is only officially supported on Windows Server 2025. Always ensure you have backups before making system changes.
Made with coffee by SysAdminDoc