_hex_ Posted March 26 Posted March 26 I have IQAir AirVision pro and i'm try to reverse engineer it it uses uboot sunxi (allwinner) was following this video according to video i need to know where flash chip is mapped in to memory then use md print whole firmware then used https://github.com/nmatt0/firmwaretools/blob/master/parse-uboot-dump.py to convert to firmware as he used bdinfo to get address (which is not present), what i do? Is there any way through which i can extract frimware from device? (like using FEL Mode) also found https://github.com/zador-blood-stained/h3-fel-mass-storage is it possible do same on Allwinner A33 logs https://xdaforums.com/attachments/boot-txt.6083991/ https://xdaforums.com/attachments/depthcharge-print_all-txt.6084119/ https://xdaforums.com/attachments/uboot_sunxi_printenv-txt.6083992/ https://xdaforums.com/attachments/uboot_more-info-txt.6084356/ 0 Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.