I have IQAir AirVision pro and i'm try to reverse engineer it
it uses uboot sunxi (allwinner)
was following this video
according to video i need to know where flash chip is mapped in to memory then use md print whole firmware then used https://github.com/nmatt0/firmwaretools/blob/master/parse-uboot-dump.py to convert to firmware as he used bdinfo to get address (which is not present), what i do?
Is there any way through which i can extract frimware from device? (like using FEL Mode)
also
found https://github.com/zador-blood-stained/h3-fel-mass-storage
is it possible do same on Allwinner A33
logs
https://xdaforums.com/attachments/boot-txt.6083991/
https://xdaforums.com/attachments/depthcharge-print_all-txt.6084119/
https://xdaforums.com/attachments/uboot_sunxi_printenv-txt.6083992/
https://xdaforums.com/attachments/uboot_more-info-txt.6084356/