dokutan / mouse_m908

Control various Redragon gaming mice from Linux, BSD and Haiku
GNU General Public License v3.0
200 stars 36 forks source link

Please can you support my redragon predator M612-RGB gaming mice? #39

Open poopman97 opened 2 years ago

poopman97 commented 2 years ago

lsusb output: Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 003 Device 002: ID 30c9:000e Luxvisions Innotech Limited HP Wide Vision HD Camera Bus 003 Device 003: ID 0bda:b00c Realtek Semiconductor Corp. Bluetooth Radio Bus 003 Device 007: ID 04d9:fc61 Holtek Semiconductor, Inc. USB Gaming Mouse Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

dokutan commented 2 years ago

It should already be supported by the generic backend, you can try to change the profile or read the settinhg to test this. Please keep in mind that changing the settings with the generic backend can cause problems.

For full support a capture of the USB communaction with the official software and a description of the mouse (buttons, dpi range) are required. I recommend looking at the other issues for further information, or ask here if you have any questions.

poopman97 commented 2 years ago

Sorry I'm a bit late but I don't exactly understand how to capture the mouse outputs I've only seen people just post it without any instructions on how they got the info. I have a second windows pc so can you please explain to me how to get those readings.

Thanks in advance!

dokutan commented 2 years ago

The basic idea is to use wireshark to capture the usb traffic for individual changes to the mousem, noting the change you made. The wireshark documentation or these guides should offer a better explanation than one i could give you here: https://bytepunk.wordpress.com/2017/03/25/reverse-engineering-a-usb-mouse/ https://github.com/pez2001/razer_chroma_drivers/wiki/Reverse-Engineering-USB-Protocol https://github.com/dokutan/rgb_keyboard/tree/master/doc (from my other usb reverse engineering project)