Am 27.05.12 14:15, schrieb Jan Hauffa: > I've published the code on github [2], it might be useful for you if you > decide to use the mustek_usb2 backend as a base.
Here's something else that might be useful, a small Java application that is able to decode some of the SQ113 command sequences: https://github.com/jhauffa/USBDumpAnalyzer Works with USB dumps generated by UsbSnoop (http://www.pcausa.com/Utilities/UsbSnoop/). Best regards, Jan
