Author Topic: Is the Rigol MSO1074Z hackable?  (Read 15708 times)

0 Members and 2 Guests are viewing this topic.

Offline mikehs

  • Contributor
  • Posts: 7
  • Country: us
Re: Is the Rigol MSO1074Z hackable?
« Reply #25 on: January 27, 2017, 12:03:01 am »
Thank you for the help, it worked!

All newbies like me, you must delete all the characters in the SN entry box before entering your SN. I deleted up to the 'D', but that apparently does not work.
 

Offline typoknig

  • Regular Contributor
  • *
  • Posts: 53
Re: Is the Rigol MSO1074Z hackable?
« Reply #26 on: April 07, 2019, 05:19:42 am »
As it currently stands, you will need an appropriate JTAG debugger.

Smgvbest has an excellent how-to here https://www.eevblog.com/forum/testgear/sniffing-the-rigol's-internal-i2c-bus/msg569236/#msg569236 , far better than my attempt a few posts earlier which had been written some weeks after doing it (for reference here https://www.eevblog.com/forum/testgear/sniffing-the-rigol's-internal-i2c-bus/msg566312/#msg566312 )

Smgvbest says that the debugger she used is no longer made. I used an Olimex ARM-USB-OCD-H which is still available.

Looks like the link you posted isn't quite right any more.  The apostrophe in "rigol's" breaks things.  Here is the correct link:

https://www.eevblog.com/forum/testgear/sniffing-the-rigol_s-internal-i2c-bus/msg569236/#msg569236
 
The following users thanked this post: Fungus


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf