chuckle... got distracted getting my python capsure scripts running.
can now extract metadata and download files, also display an image. 😁
I'll get the firmware upload working next, then there's no need to use the xrite software/servers to do this.
#hacking #capsure #rm200
No it can't really run doom. yet. đŸ¤Ŗ
To remind me to finish this (and keep track) I've uploaded the initial script to @Codeberg - https://codeberg.org/ivor/RM200-tools
just a basic python script so far - todo change to a module.
RM200-tools

Python utils for accessing an RM200 colorimeter

Codeberg.org
Not quite got firmware upload working... But wondering what "top secret" does in the menu. đŸ¤”đŸ¤Ŗ
Script successfully flashed twice ok. 👍👌 Then did something wrong. đŸ˜Ŧ Not sure this is recoverable.
And no, left and or right do nothing. Oh well.
Mulder doesn't care. About anything.
Yay. Kicked it back into existence with openocd and some flashing then reran the python firmware util.
Right, going to see if I can get the QC firmware doing anything.
So many interesting little tidbits in the firmware... I think I need to get another blog on the latest #hacking done this weekend.
Ok. So the bootloader has a NAND viewer, and in there you can see the chipid. Can't work out how to view and write it via JTAG yet.
#hacking

Hmmm... Jtag can query and show the flash chip details:

> nand info 0 0
#0: NAND 256MiB 3.3V 8-bit (Hynix) pagesize: 2048, buswidth: 8, erasesize: 131072
#0: 0x00000000 (128kB) erase state unknown (block condition unknown) flash device 'NAND 256MiB 3.3V 8-bit (Hynix)' found

But fails trying a read. â˜šī¸đŸ¤”

> nand dump 0 nand_full.bin 0x0 0x100000
reading NAND flash page failed

got carried away adding features and functions to my capsure python library you say? no. why? what makes you say that??
oh. 😁