_hex_ Posted March 26 Share Posted March 26 I have IQAir AirVision pro and i'm try to reverse engineer it it uses uboot sunxi (allwinner) was following this video according to video i need to know where flash chip is mapped in to memory then use md print whole firmware then used https://github.com/nmatt0/firmwaretools/blob/master/parse-uboot-dump.py to convert to firmware as he used bdinfo to get address (which is not present), what i do? Is there any way through which i can extract frimware from device? (like using FEL Mode) also found https://github.com/zador-blood-stained/h3-fel-mass-storage is it possible do same on Allwinner A33 logs https://xdaforums.com/attachments/boot-txt.6083991/ https://xdaforums.com/attachments/depthcharge-print_all-txt.6084119/ https://xdaforums.com/attachments/uboot_sunxi_printenv-txt.6083992/ https://xdaforums.com/attachments/uboot_more-info-txt.6084356/ 0 Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.