Ok, I got it working on python 3, the script telnets to the scope and liberates the options for the current session.
Should work for DSOX2000A and 3000A, for 3000T use the password generator from a couple of posts above.
The script connects to the scope and the scope then complains about "unfinalized software" but works.
-l MSO -l BW20 -l DIS --perf --forcemaxmem
yields: MSO, memMax, EMBD, AUTO, COMP, SGM, MASK, BW20, EDK, WAVEGEN, DIS, DVM, ASV, RML, PLUS
-l All -l SCPIPS -l BW20
yields:
DS2000AUTA*, D2000GENA*, D2000BDLA*, All, MSO*, memMax*, SGM*, BW20, EDK, WAVEGEN*, DIS*, DVM, ASV*, SCPIPS, RML, PLUS*
So I am not sure which one of the two is preferable...
Original script by gammoriginal by gaminn
https://www.eevblog.com/forum/testgear/dsox2000-and-3000-series-licence-have-anyone-tried-to-hack-that-scope/msg2336781/#msg2336781$ python conn_pexpect.py
Waiting for Scope to wake up
ping received
Trying 192.168.1.23...
Connected to 192.168.1.23.
Escape character is '^]'.
Welcome to the Windows CE Telnet Service on a-dx2002a-ABCDE
login: infiniivision
infiniivision
Password: skywalker1977
Pocket CMD v 6.00
\>
\> processmgr kill infiniivisionlauncher.exe
Killing Launcher
\Secure\infiniiVision\infiniivisionLauncher.exe -l MSO -l BW20 -l DIS --perf --forcemaxmem
Restarting Launcher
exit
Thank you everyone for the work and the time to document. I am still motivated to learn how to modify the firmware to have the options permanently enabled, but am taking this stepping stone
Still, should someone have an idea how to get my above script with exscript working to recognize the prompt, I'd be grateful.
The script was tested under fedora 41, I needed to install telnet (and the ping3 library).