Tools for the ITI1480A usb protocol analyser
Project description
User-space driver and tools for ITI1480A USB analyser.
Home: http://github.com/vpelletier/ITI1480A-linux
Disclaimer
I am not affiliated with International Test Instruments in any way. ITI kindly accepted that I start reverse-engineering their windows-only software so I could use with Linux the I bought from them. I had no privileged access to any documentation of any kind.
Dependencies
Python 2.4+ (though mostly tested with 2.7 nowadays) or pypy
libusb 1.0
udev (should come from your distribution
ply, or for better parsing performance you can try my ply fork
ulpitest.rbf from 1480A USB Protocol Analyzer Software (4.1.0b ultitest.rbf is released stand-alone)
FX2 firmware
A free software version of this firmware has been reimplemented, so there are two ways:
Either
ITI1480A.spt from 1480A USB Protocol Analyzer Software
or
Installation
Notes: paths and udev group are suitable for at least Debian. You may need to edit udev/ITI1480A.rules and adapt below paths.
python setup.py install cp udev/ITI1480A.rules /etc/udev/rules.d/ cp udev/ITI1480A.sh /lib/udev/ cp ulpitest.rbf /lib/firmware/ITI1480A.rbf
ITI’s FX2 firmware:
spt2hex /path/to/ITI1480A.spt cp ITI1480A_1.ihx /lib/firmware/ITI1480A.ihx
spt2hex may generate several files (ITI1480A_0.ihx, ITI1480A_1.ihx, …), use the highest-numbered one.
From source:
cd CY7C68013A FX2LIBDIR=/path_to/fx2lib/ make cp build/ITI1480A.ihx /lib/firmware/
To test installation, (re)plug your protocol analyser. If the “Host power” led turns on within a few seconds, your FX2 firmware was successfully installed and loaded, your analyser is ready to use.
Usage
To start a capture:
iti1480a-capture > captured.usb
Send signal SIGINT (^C) or SIGTERM to stop the capture, wait analyser to push all data to host and exit.
Send signal SIGTSTP (^Z) to pause the analyser, SIGCONT (fg) to resume.
To get a human-friendly text dump of a previos capture:
iti1480a-display -i captured.usb
To wath running capture without saving it:
iti1480a-capture | iti1480a-display -f
To watch running capture and save it for later analysis:
iti1480a-capture | iti1480a-display -ft captured.usb
By default, iti1480a-display hides a lot of verbose events, like NAK’ed and SOF transactions, or EOP events. You can tweak its filtering using -q (quieter) and -v (more verbose). Default verbosity level is 0, -q decrements it and -v increments it. Verbosity levels go from -1 (most quiet) to 4 (most verbose).
Example outputs: https://github.com/vpelletier/ITI1480A-linux/tree/master/examples
Red timestamps mean that output is detected as being non-chronological. This happens for implementation detail reasons, and is considered a bug.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file ITI1480A-linux-2.0.tar.gz
.
File metadata
- Download URL: ITI1480A-linux-2.0.tar.gz
- Upload date:
- Size: 18.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 7b388b04e65ba98682f3b3071126186a9179ee246357889296a45b3ffed2984e |
|
MD5 | 1c278636e734f1e617d79eebc2fa0ff1 |
|
BLAKE2b-256 | 57a18d9f079f59bfdfbf9b501bc9a76bf308d307fb52ac95db74a8fff3aebd74 |