missionpinball / mpf-spike

MPF Spike Bridge
http://docs.missionpinball.org/en/latest/hardware/spike
4 stars 2 forks source link

original logic analyzer traces #1

Open Ashram56 opened 2 years ago

Ashram56 commented 2 years ago

Good morning,

Would it be possible to get access to the original logic analyzer traces that were used to write this bridge ? I would be interested into it, as I'm really not a SW programmer, and reverse engineering from the Rust code, while certainly possible, would be a last resort (as I assume the information is available somewhere)

Regards

jabdoa2 commented 2 years ago

Those would not be up to date with the current spike firmware. I guess the easiest way would be to capture new ones from an updated machine. One way (works on spike 1) is documented here: https://docs.missionpinball.org/en/latest/hardware/spike/troubleshooting.html#capturing-the-bus-traffic-of-your-game-using-interceptty

Ashram56 commented 2 years ago

Thank you for your prompt response

One point I'd like to clarify: the link you provided refer to shell commands (bash or otherwise), and I assume this is through the serial interface (as indicated in other sections of the link you provided) ? What is the speed/parity of this serial interface ?

Alternatively, I was going to connect a RS485 sniffer, but I would need some trial/error to determine the baud rate / parity of the original netbus