On Wed, Oct 26, 2016 at 2:19 PM, <julima...@gmail.com> wrote: > b'/osceleton2/joint\x00\x00\x00,siiffffd\x00\x00\x00head\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05C\xec\xad&C\xa0\x81vDG\x84N?\x80\x00\x00Bu\x7f\xedh5f\x9b' > -------------------------------------------------- > > > It supouse to be this: > -------------------------------------------------- > Address pattern: "/osceleton2/joint" > Type tag: "siiffffd" > s: Joint name, check out the full list of joints below > i: The ID of the sensor > i: The ID of the user > f: X coordinate of joint in real world coordinates (centimetres) > f: Y coordinate of joint in real world coordinates (centimetres) > f: Z coordinate of joint in real world coordinates (centimetres) > f: confidence value in interval [0.0, 1.0] > d: time stamp in milliseconds since Unix epoch > > example: > > /osceleton2/joint head 0 1 109.07692 54.557518 666.81543 1. 0.
Well, the first bit clearly matches. Then you have four bytes ending with a comma (0x2C) and then siiffffd. A few more NULs and "head". So really, the interesting part starts after that. Can you find information you recognize in any of the bytes that follow that? ChrisA -- https://mail.python.org/mailman/listinfo/python-list