Hi friends,

On the heels of seeing that this month's presentation will be about reverse engineering, I thought I'd pipe up and mention that I have some stuff that might be interesting.

I have a commercially-produced MIDI controller that has some bugs, but is already obsoleted by the manufacturer. Long story short, its CPU is an off-the-shelf ARM Cortex-M and the manufacturer didn't enable code protection so I was able to download its firmware image in the clear.

In my journey to understand the existing code (in order to fix its bugs and/or write better code), I've been developing a GUI RE tool for Cortex-M machine code. Its features include:

- Disassembly view with instruction-by-instruction room for labels and comments
 - Emulation with single-step, breakpoints, and instruction skip
 - Memory read/write watchpoints
 - (limited) NVIC emulation
 - (extremely limited) peripheral emulation

I call it CorTexMex (for Cortex-M Explorer) and would be proud to demonstrate it at a meeting if enough folks are interested. It's open-source, published on GitHub, and an ongoing work in progress.

Whaddya think?

-B


_______________________________________________
Triangle, NC Embedded Computing mailing list

To post message: [email protected]
List info: http://mail.triembed.org/mailman/listinfo/triembed_triembed.org
TriEmbed web site: http://TriEmbed.org
To unsubscribe, click link and send a blank message: 
mailto:[email protected]?subject=unsubscribe

Reply via email to