Products > Test Equipment
Sniffing the Rigol's internal I2C bus
<< < (596/899) > >>
mrflibble:

--- Quote from: MrAureliusR on February 18, 2014, 06:01:33 pm ---I'd be happy to write one myself, or even start a separate thread with all the instructions, plus a video showing me doing it with my scope. I just need to understand which method is better, and figure out which firmware is which etc. I guess I'll try and slug through the whole thread.

--- End quote ---

In the interest of future n00bs, please do. Write a summary of the installation procedure that is easy to follow for others I mean. Otherwise you are just another "me too" never to be heard of again after they fixed stuff for themselves. :P See enough of that shit in other threads already. ;) Notably the Flir E4 thread.
neslekkim:

--- Quote from: MrAureliusR on February 18, 2014, 06:01:33 pm ---I have read most of the thread, but it's 61 pages!! It's crazy. And where is the summary? I can't find a summary that includes both methods and the steps required.

I'd be happy to write one myself, or even start a separate thread with all the instructions, plus a video showing me doing it with my scope. I just need to understand which method is better, and figure out which firmware is which etc. I guess I'll try and slug through the whole thread.

--- End quote ---

around the pages here https://www.eevblog.com/forum/testgear/sniffing-the-rigol's-internal-i2c-bus/2835/ there is a good summary.
GlassFET:
New here. I'm an experienced analog engineer, but an IT neophyte, so please go easy on me for what could be a stupid question:

I want to hack a DS2102A. My software version is 00.02.00, never touched. I am nervous about messing up the unit, so I tried to "dry run" some of the procedure WITHOUT first loading the hacked FW, just to get a handle on it before taking that first step. When I perform the "*IDN?" query in UltraSigma, it returns: "RIGOL TECHNOLOGIES,DS2102A,DS2D15xxxxxxx,00.02.00". I do not see the string beginning with "02008400..." that I was expecting.

So, is this simply because I have not yet loaded the hacked FW which would enable the correct response, or something else I'm doing wrong?

Thanks
corax:

--- Quote from: GlassFET on February 18, 2014, 08:38:19 pm ---So, is this simply because I have not yet loaded the hacked FW which would enable the correct response, or something else I'm doing wrong?

--- End quote ---

Yes.  That's the point of the hacked firmware- to add a dump of the keys to that output.

GlassFET:
Corax,

Thanks for answering my simpleton question. OK, I guess I will have to "bite the bullet" and load the revised FW then.
Navigation
Message Index
Next page
Previous page
There was an error while thanking
Thanking...

Go to full version
Powered by SMFPacks Advanced Attachments Uploader Mod