1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-17 20:08:12 +00:00
trezor-firmware/tools/mem_read.py

52 lines
1.3 KiB
Python
Raw Normal View History

2016-05-26 20:20:34 +00:00
#!/usr/bin/env python
from __future__ import print_function
from trezorlib.debuglink import DebugLink
2017-06-23 19:31:42 +00:00
from trezorlib.client import TrezorClient
2016-05-26 20:20:34 +00:00
from trezorlib.transport_hid import HidTransport
import sys
# usage examples
# read entire bootloader: ./mem_read.py 8000000 8000
# read initial stack pointer: ./mem_read.py 8000000 4
# an entire bootloader can be later disassembled with:
# arm-none-eabi-objdump -D -b binary -m arm -M force-thumb memory.dat
# note that in order for this to work, your trezor device must
# be running a firmware that was built with debug link enabled
2017-06-23 19:31:42 +00:00
2016-05-26 20:20:34 +00:00
def main():
# List all connected TREZORs on USB
devices = HidTransport.enumerate()
# Check whether we found any
if len(devices) == 0:
print('No TREZOR found')
return
# Use first connected device
2017-09-04 11:36:31 +00:00
transport = devices[0]
debug_transport = devices[0].find_debug()
2016-05-26 20:20:34 +00:00
# Creates object for manipulating TREZOR
client = TrezorClient(transport)
debug = DebugLink(debug_transport)
arg1 = int(sys.argv[1], 16)
arg2 = int(sys.argv[2], 16)
step = 0x400 if arg2 >= 0x400 else arg2
2016-05-26 20:20:34 +00:00
f = open('memory.dat', 'w')
for addr in range(arg1, arg1 + arg2, step):
2017-06-23 19:31:42 +00:00
mem = debug.memory_read(addr, step)
f.write(mem)
2016-05-26 20:20:34 +00:00
f.close()
client.close()
2017-06-23 19:31:42 +00:00
2016-05-26 20:20:34 +00:00
if __name__ == '__main__':
main()