Jump to content

_hex_

Validating
  • Posts

    1
  • Joined

  • Last visited

  1. I have IQAir AirVision pro and i'm try to reverse engineer it it uses uboot sunxi (allwinner) was following this video according to video i need to know where flash chip is mapped in to memory then use md print whole firmware then used https://github.com/nmatt0/firmwaretools/blob/master/parse-uboot-dump.py to convert to firmware as he used bdinfo to get address (which is not present), what i do? Is there any way through which i can extract frimware from device? (like using FEL Mode) also found https://github.com/zador-blood-stained/h3-fel-mass-storage is it possible do same on Allwinner A33 logs https://xdaforums.com/attachments/boot-txt.6083991/ https://xdaforums.com/attachments/depthcharge-print_all-txt.6084119/ https://xdaforums.com/attachments/uboot_sunxi_printenv-txt.6083992/ https://xdaforums.com/attachments/uboot_more-info-txt.6084356/
×
×
  • Create New...

Important Information

Terms of Use - Privacy Policy - Guidelines