So I am trying to learn, but seem to be at the bottom of a huge mountain. If some experienced mountain guide could point me (to) the path to learning more about reverse engineering

I opened nk.bin from 2.42 in ghidra (Arm cortex little endian) and went to the address* 0x00FBC7FF
But unfortunately it seems like I forgot to set a switch because there seems to be nothing that makes these four bytes stand out, no "found a function" or "array=..." around these. If I search for the same four bytes in firmware 2.66, I find >500 hits and ghidra tells me that is quite enough, thank you very much.
So how do I identify the correct position where to replace the one byte? A bit above, there was mention of "record 17x" or so, but I haven't seen a reference to that (in ghidra) that I am able to identify.
Did I open the file wrongly and everything would be clear with the correct architecture chosen or am I overlooking something else fundamental?
Thank you very much for any hints.
Once I understood how it's done in 2.42 which is documented with the address, I'll try 2.66 for this DSOX2000 (and if that works, there's my 3000T waiting

)
*" There 4 bytes for patch "04 00 a0 e1" to "00 00 a0 e3" in start address FBC7FFh and checksum in address D40457h changed from "EB" to "E9". Actually checksum contain 4 bytes, but changed only this last byte (first in file as it's little endian). Checksum algorithm is UByte8bit.
" Post by Safar July 27 2017