Products > Test Equipment
MSO2000 Application module hack
<< < (11/24) > >>
Lunasix:
I just found at a reasonnable price a MSO2024 with the original DPO2COMP module. I would never have thought, before reading this post, that there was nothing else in this module... :)
Fortunately, the global price was made whithout taking into account this module.
relu:
So, did anybody tried this hack?

I have order the boards, the sim card holder and the memory. Soldered everything. Programmed the memory with the PICkit2.
check that the eeprom is programmed correctly. plug in the module (another small PCB taped to have the right width).

Aaaaand it doesn't work.
Maybe I haven't checked carefully enough if the module makes contact with the scope.
or maybe because I have Firmware version v1.52 PP3 15-Aug-12.
or what other?

Would be nice to hear that someone tried it and it works. . .
Lunasix:
Tested for fun (I have original one) with very old revision and then with last revision, no problem. With a 08 eeprom, A2 (hard and soft) will always be 0. A1 and A0 are only selected by scope software, and A0 remains to 0. A1 will select key 0 or key 1 (normally, A1 is hard coded from slot to eeprom pin, allowing two keys), and will select in the eeprom the corresponding virtual key. Reading starts at address 04, find the string (terminated with 0) and reads 3 more bytes at FF (thus, ending on a 16 bytes boundary). If the scope reads garbage (or 0xFF), it will say it needs a software update, since value in the key isn't recognized (but supposed to be valid).
Lunasix:
Small eeprom (BGA, 0.8 x 0.8 mm)  is wired directly on back of sim connector (don't drink before....).
drsurfer:
Relu, I was about to post the same message  :o  you did exactly what I did, ending in the very same frustration  |O  |O

My scope is MSO 2024B with same v1.52 PP3 15-Aug-12 firmware.

As soon as I can I will borrow another scope and I will connect to eeprom's I2C bus to understand what's going on.

The first stupid thing I will try is to write protect the EEprom (the damn trace to cut is under the chip). A successful write could easily tell the presence of an EEprom in place of a ROM (or a write protected EEprom).

Lunasix, can you clarify what do you mean with "old revision" and "last revision"? Scope firmware version ?


DrSurfer


--- Quote from: relu on September 22, 2014, 08:48:26 pm ---So, did anybody tried this hack?

I have order the boards, the sim card holder and the memory. Soldered everything. Programmed the memory with the PICkit2.
check that the eeprom is programmed correctly. plug in the module (another small PCB taped to have the right width).

Aaaaand it doesn't work.
Maybe I haven't checked carefully enough if the module makes contact with the scope.
or maybe because I have Firmware version v1.52 PP3 15-Aug-12.
or what other?

Would be nice to hear that someone tried it and it works. . .

--- End quote ---
Navigation
Message Index
Next page
Previous page
There was an error while thanking
Thanking...

Go to full version
Powered by SMFPacks Advanced Attachments Uploader Mod