Author Topic: hacking MSO1000Z with USB blaster  (Read 1837 times)

0 Members and 1 Guest are viewing this topic.

Offline GiorevaTopic starter

  • Contributor
  • Posts: 19
hacking MSO1000Z with USB blaster
« on: June 01, 2017, 07:10:55 am »
Hi

I used china USB blaster.
10 hours for download.

Driver of USB blaster is WinUSB 

C:\openocd-0.10.0\bin-x64\openocd.exe -d1 -f C:\openocd-0.10.0\scripts\interface\altera-usb-blaster.cfg -f C:\openocd-0.10.0\scripts\target\imx28.cfg
telnet a 127.0.0.1 : 4444
halt
dump_image rigol.bin 0x40000000 0x3FFFFFF
rigup scan rigol.bin > mso1074zs.txt
rigup license mso1074z.txt 0x1C0FF
On rigol:
Utility>Options>Setup>Editor=ON

if halt do not respond message, remove JTAG and re connect.
« Last Edit: June 01, 2017, 07:36:08 am by Gioreva »
 


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf