Closed andimik closed 1 year ago
Hmm. Could there be something up with the input data source? It seems as though the PI is not repeating every 104 bits but instead every 64 bits:
$ grep --only-matching --byte-offset '0101001000011000' ~/Downloads/5218_binaer.txt | head
0:0101001000011000
64:0101001000011000
128:0101001000011000
192:0101001000011000
256:0101001000011000
320:0101001000011000
384:0101001000011000
448:0101001000011000
512:0101001000011000
576:0101001000011000
Maybe the 10-bit checkwords have been stripped out? That would make the group length to be 64 (40 bits missing from every group). Redsea can't decode binary without the correct checkwords, but you can first transform the data into the RDS Spy hex format, where they are not needed.
Well, it's an old file in my archive. I will just convert the 4x 16 bits (which is 64 bits) to hex. Seems there is no additional overhead. That's why the PI is repeated after 64 bits.
Unfortunately I don't know which tool has created that file.
You can close it, if you want.
Closed
But thank you for the grep
parameter!
No probs! Glad I could help
According to the readme, the switch
-i bits
resp--input bits
will load ASCII files with 1 and 0. But I don't get any output?The file itself contains all 4 blocks, 0x5218 is
0101001000011000
5218_binaer.txt
In the source code I also found the still existing switch
-b
But none of the methods is working here?