Author Topic: hacking MSO1000Z with USB blaster  (Read 1533 times)

0 Members and 1 Guest are viewing this topic.

Offline Gioreva

  • Contributor
  • Posts: 19
hacking MSO1000Z with USB blaster
« on: June 01, 2017, 07:10:55 am »

I used china USB blaster.
10 hours for download.

Driver of USB blaster is WinUSB 

C:\openocd-0.10.0\bin-x64\openocd.exe -d1 -f C:\openocd-0.10.0\scripts\interface\altera-usb-blaster.cfg -f C:\openocd-0.10.0\scripts\target\imx28.cfg
telnet a : 4444
dump_image rigol.bin 0x40000000 0x3FFFFFF
rigup scan rigol.bin > mso1074zs.txt
rigup license mso1074z.txt 0x1C0FF
On rigol:

if halt do not respond message, remove JTAG and re connect.
« Last Edit: June 01, 2017, 07:36:08 am by Gioreva »

Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo