
Did you know your Android smartphone hides powerful secret menus and diagnostic tools that most people never access? These Android phone codes can reveal hidden system information, testing tools, and advanced settings — all accessible directly from your phone’s dialer.
Whether you’re a tech enthusiast or just curious about what’s hidden beneath your Android interface, this guide will walk you through the most useful Android phone codes in 2025, how to use them safely, and what each one does.
🔍 What Are Android Phone Codes?
Android phone codes are special numeric combinations you can type directly into your phone app to open hidden menus or access deep system settings. These codes are officially part of Android’s base source code — meaning they theoretically work on all Android phones.
However, some manufacturers (like Samsung, Xiaomi, or OnePlus) also add their own custom codes. In this article, we’ll focus on base Android phone codes that work across most devices.
🔹 Samsung Secret Codes (2025)
| Code | Function | Safety |
|---|---|---|
*#06# | Show IMEI number | ✅ Safe |
*#0*# | General Test Menu (screen, vibration, sensors) | ✅ Safe |
*#1234# | Check software/firmware version (AP, CP, CSC) | ✅ Safe |
*#12580*369# | Software & hardware version details | ✅ Safe |
*#0011# | Service Mode (network info) | ⚙️ Advanced |
*#0228# | Battery status (ADC, RSSI) | ✅ Safe |
*#0283# | Audio loopback test | ⚙️ Advanced |
*#03# | NAND flash serial number | ✅ Safe |
*#9090# | Diagnostic configuration | ⚙️ Advanced |
*#0808# | USB settings / debugging mode | ⚙️ Advanced |
*#2663# | Touchscreen firmware version | ✅ Safe |
*#7780# | Factory data reset (soft reset) | ⚠️ Dangerous |
*2767*3855# | Full factory reset (hard reset) | ⚠️ Dangerous |
*#232331# | Bluetooth test | ✅ Safe |
*#1472365# | GPS test | ⚙️ Advanced |
*#9900# | System dump mode (clear logs) | ⚙️ Advanced |
*#272*IMEI# | Product code menu (may reconfigure firmware) | ⚠️ Dangerous |
Note: Some Samsung One UI 6+ phones (2024–2025) restrict access to certain service menus for security.
🔹 Xiaomi / Redmi / POCO Secret Codes (MIUI 14 – HyperOS)
| Code | Function | Safety |
|---|---|---|
*#06# | IMEI display | ✅ Safe |
*#*#4636#*#* | Testing menu (network, battery, usage stats) | ✅ Safe |
*#*#6484#*#* | Hardware Test / CIT Menu (check all sensors) | ✅ Safe |
*#*#284#*#* | Create bug report (logs saved to storage) | ✅ Safe |
*#*#2664#*#* | Touchscreen test | ✅ Safe |
*#*#2663#*#* | Touchscreen firmware version | ✅ Safe |
*#*#232339#*#* | Wi-Fi test | ✅ Safe |
*#*#1472365#*#* | GPS test | ⚙️ Advanced |
*#*#7262626#*#* | Field test (network and signal info) | ⚙️ Advanced |
*#*#273282*255*663282*#*#* | Media file backup | ⚙️ Advanced |
*#*#7780#*#* | Factory data reset | ⚠️ Dangerous |
*#*#64663#*#* | Engineer Mode (newer HyperOS builds) | ⚙️ Advanced |
Tip: Xiaomi’s “CIT” menu (*#*#6484#*#*) is one of the most powerful diagnostics menus on Android — use it for hardware checks.
🔹 OnePlus Secret Codes (OxygenOS 14 / 15)
| Code | Function | Safety |
|---|---|---|
*#06# | IMEI number | ✅ Safe |
*#*#4636#*#* | General testing menu | ✅ Safe |
*#808# | Engineering mode (hardware diagnostics) | ⚙️ Advanced |
*#801# | Engineering Mode (qualcomm factory tools) | ⚙️ Advanced |
*#802# | GPS test | ⚙️ Advanced |
*#803# | Wi-Fi engineering mode | ⚙️ Advanced |
*#804# | Bluetooth test | ⚙️ Advanced |
*#805# | Battery test | ✅ Safe |
*#888# | PCB version and hardware info | ✅ Safe |
*#1234# | Software version | ✅ Safe |
*#999# | Factory mode (varies) | ⚠️ Dangerous |
*#*#7780#*#* | Factory data reset | ⚠️ Dangerous |
Tip: On new OnePlus (Android 15) builds, *#808# opens an internal diagnostic tool with test modules for display, camera, and sensors.
🔹 Google Pixel Secret Codes (Android 15 – 2025)
| Code | Function | Safety |
|---|---|---|
*#06# | Display IMEI / EID | ✅ Safe |
*#*#4636#*#* | Device information, battery, and network | ✅ Safe |
*#*#2845#*#* | RIL test (radio interface layer test) | ⚙️ Advanced |
*#*#1472365#*#* | GPS test | ⚙️ Advanced |
*#*#232331#*#* | Bluetooth test | ✅ Safe |
*#*#232339#*#* | Wi-Fi test | ✅ Safe |
*#*#0289#*#* | Audio test | ✅ Safe |
*#*#0*#*# | LCD test (some Pixels) | ✅ Safe |
*#*#7780#*#* | Factory data reset | ⚠️ Dangerous |
*#*#7262626#*#* | Field test (signal strength, network data) | ⚙️ Advanced |
Note: Pixels rely heavily on *#*#4636#*#* for most hidden testing — Google removed many older diagnostic codes for security reasons.
🧠 Pro Tip: Universal & Safe Codes (Work on most Android phones)
| Code | Description |
|---|---|
*#06# | IMEI number |
*#*#4636#*#* | Full device info and testing |
*#*#426#*#* | Google Play Services diagnostics |
*#*#225#*#* | Calendar info |
*#*#0283#*#* | Loopback test |
*#*#232338#*#* | Wi-Fi MAC address |
📱 Universal Secret Codes That Work on All Phones
Not all secret codes are Android-exclusive. Here are two universal MMI codes that even work on iPhones:
*#06# – View Your Device IMEI & Serial Numbers
Type this code to instantly reveal your phone’s IMEI, serial numbers, and device IDs. You may also see barcodes — take a quick screenshot and save it for future reference.
*#07# – View Regulatory Information
Displays the regulatory labels and certifications for your phone. While not particularly useful daily, it’s handy to verify compliance or check model details.
🧩 The Real Android Secret Codes (Stock Android)
To access most hidden Android menus, you’ll use this format:*#*#CODE#*#*
As soon as you type the final “*”, the menu will appear automatically. Note that the code will disappear even if you mistype — so don’t panic if nothing happens.
🔧 *#*#4636#*#* – Android Testing Menu
This is one of the most powerful and useful hidden Android phone codes.
Inside the Testing Menu:
- Phone Information – Shows your hardware and network data, including signal strength (in dBm), connection type, and other advanced details.
- Usage Statistics – Lists how long each app has been used and when it was last opened.
- Wi-Fi Information – Includes three submenus: Wi-Fi API, Wi-Fi Config, and Wi-Fi Status, where you can view signal strength, MAC address, connection speed, and more.
⚠️ Warning: Avoid changing network settings here unless you know what you’re doing. Incorrect changes may affect connectivity.
📅 *#*#225#*#* – Calendar Information Menu
This secret code opens the Calendar Info Menu, displaying all the Google calendars linked to your device, along with how many upcoming events each has. It’s useful if you manage multiple accounts and want to confirm they’re syncing properly.
☁️ *#*#426#*#* – Firebase Cloud Messaging (FCM) Diagnostics
This code opens a diagnostic menu for Firebase Cloud Messaging, the system Google uses for push notifications and Play Store updates.
- Tap the three dots on the top right to view Advanced Info and event logs.
- Use the Events button to view connection activity and network logs.
This code usually only works on phones using the Google Dialer app.
📞 *#*#886266344#*# *– Visual Voicemail Configuration
This Visual Voicemail configuration menu lets you:
- Sync voicemail manually.
- Access hidden network configuration settings (not recommended to edit).
If voicemails aren’t syncing properly, using this menu can sometimes help trigger updates.
🐾 *#*#729#*#* – Pet Mode (Paw Mode)
A fun Easter egg from older Android versions, Pet Mode would show a cat or dog paw animation when receiving a call. Unfortunately, it’s no longer active in recent Android versions but may still work on older builds.
📡 *#*#2627#*# *– CMAS Testing Mode
Enables Cell Broadcast Testing Mode, used for internal network tests. Typing the code again disables it. While not directly useful to average users, it’s an interesting hidden function built into Android’s infrastructure.
☎️ *#*#828282#*# *– Telecom Developer Menu
This code opens the Telecom Developer Menu, designed for debugging call features. In newer Android versions, it may appear empty. It’s linked to “Enhanced Call Blocking” features depending on your carrier.
💡 *#*#8477#*#* – Android Tips Menu
Listed in the Android source code as TIPS, this code supposedly displays Android pro tips and tutorials. It might only work on older devices, but it’s worth testing if you’re running an older Android version.
📶 Carrier-Specific Codes (Work on All Phones)
Besides Android’s built-in secret codes, mobile carriers like Verizon, AT&T, and T-Mobile offer short codes for billing and data info.
These are called Star Codes, Pound Codes, or Service Shortcodes.
| Function | Verizon | AT&T | T-Mobile |
|---|---|---|---|
| Check Balance | *225# | *225# | #225# |
| Check Minutes | *646# | *646# | #646# |
| Check Data Usage | #3282 | *3282# | #932# |
These codes work on Android and iPhone and send a text message with your requested information.
🧠 Bonus: Manufacturer-Specific Hidden Codes
Different brands add their own secret menus. For example:
- Samsung: Access advanced diagnostic tools like camera, speaker, and vibration tests.
- Google Pixel: Use diagnostic codes for battery health and hardware checks.
- OnePlus / Xiaomi: Custom engineering menus for system testing.
Always search:
👉 “[Your Phone Brand] secret codes 2025”
to find the latest hidden menus for your device.
⚠️ Important Safety Note
While exploring Android phone codes can be exciting, use them with caution. Some codes can alter system settings, clear data, or change configurations unintentionally. If you’re unsure, avoid confirming any prompts or toggles.
✅ Final Thoughts: Hidden Power of Android Secret Codes
Android’s open-source nature gives users access to advanced testing tools and developer options that other operating systems hide. From checking your IMEI number to viewing deep Wi-Fi stats, these hidden Android menus can help you understand your device better.
So go ahead — try a few safe codes like *#06# or *#*#4636#*#*, and see what hidden treasures lie inside your smartphone.
Frequently Asked Questions — Top Secret Android Phone Codes
Quick answers about using hidden Android dialer codes safely, how they work across brands, and what to watch out for.
Secret Android phone codes are short dialer strings (often containing * and #) that open hidden menus, diagnostic screens, and service tools. Open your Phone app, type the code exactly, and the hidden menu will usually appear. Behavior varies by brand, Android version, and carrier.
Many codes (like *#06# to show IMEI) are safe. Others can change settings or perform factory resets (*#*#7780#*#*, *2767*3855#) and are dangerous. Always back up your data and avoid destructive codes unless you know exactly what they do.
Manufacturers (Samsung, Xiaomi, OnePlus, Google) and network carriers may block or change codes. New Android security updates also remove certain shortcuts. If a code does nothing, it’s likely blocked on your device or Android version.
Brand-specific diagnostic menus are usually trustworthy: Samsung’s *#0*#, Xiaomi’s CIT menu *#*#6484#*#*, OnePlus engineering mode *#808#, and Pixel’s info via *#*#4636#*#*. Use them to test display, sensors, GPS, Wi-Fi, and audio.
Most read-only diagnostic codes do not void warranty. However, codes that reflash firmware or perform low-level resets could lead to problems and might be considered tampering by some service centers. Avoid destructive codes unless you have expertise and backups.
Backup photos, contacts, messages, and important files to cloud storage or a PC. Ensure at least 50% battery, disable screen lock if required for testing, and write down your Google account credentials (required after factory resets).
Yes. Carriers sometimes disable vendor diagnostic codes and provide their own USSD codes for balance checks and service commands. Operator USSD codes are carrier-specific and unrelated to manufacturer hidden menus.
Phadera Tech has brand-specific lists for Samsung, Xiaomi/Redmi/POCO, OnePlus, and Google Pixel in our main guide. If you share your exact model (e.g., “Samsung Galaxy S23 Ultra”), we can provide tailored code warnings for that device.