Am 27.05.12 14:15, schrieb Jan Hauffa:
> I've published the code on github [2], it might be useful for you if you
> decide to use the mustek_usb2 backend as a base.

Here's something else that might be useful, a small Java application
that is able to decode some of the SQ113 command sequences:

https://github.com/jhauffa/USBDumpAnalyzer

Works with USB dumps generated by UsbSnoop
(http://www.pcausa.com/Utilities/UsbSnoop/).

Best regards,
  Jan


Reply via email to