2017-12-12 20:22:39 +00:00
|
|
|
#!/usr/bin/env python3
|
2016-05-26 20:20:34 +00:00
|
|
|
from trezorlib.debuglink import DebugLink
|
2018-03-05 16:30:44 +00:00
|
|
|
from trezorlib.transport import enumerate_devices
|
2016-05-26 20:20:34 +00:00
|
|
|
import sys
|
|
|
|
|
2017-02-20 13:36:00 +00:00
|
|
|
# usage examples
|
|
|
|
# read entire bootloader: ./mem_read.py 8000000 8000
|
|
|
|
# read initial stack pointer: ./mem_read.py 8000000 4
|
|
|
|
# an entire bootloader can be later disassembled with:
|
|
|
|
# arm-none-eabi-objdump -D -b binary -m arm -M force-thumb memory.dat
|
|
|
|
# note that in order for this to work, your trezor device must
|
|
|
|
# be running a firmware that was built with debug link enabled
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2019-04-15 14:15:28 +00:00
|
|
|
def find_debug():
|
|
|
|
for device in enumerate_devices():
|
|
|
|
try:
|
|
|
|
debug_transport = device.find_debug()
|
|
|
|
debug = DebugLink(debug_transport, auto_interact=False)
|
|
|
|
debug.open()
|
|
|
|
return debug
|
|
|
|
except Exception:
|
|
|
|
continue
|
|
|
|
else:
|
|
|
|
print("No suitable Trezor device found")
|
|
|
|
sys.exit(1)
|
2016-05-26 20:20:34 +00:00
|
|
|
|
|
|
|
|
2019-04-15 14:15:28 +00:00
|
|
|
def main():
|
|
|
|
debug = find_debug()
|
2016-05-26 20:20:34 +00:00
|
|
|
|
2017-02-20 13:36:00 +00:00
|
|
|
arg1 = int(sys.argv[1], 16)
|
|
|
|
arg2 = int(sys.argv[2], 16)
|
|
|
|
step = 0x400 if arg2 >= 0x400 else arg2
|
|
|
|
|
2019-04-15 14:15:28 +00:00
|
|
|
f = open("memory.dat", "wb")
|
2017-02-20 13:36:00 +00:00
|
|
|
|
|
|
|
for addr in range(arg1, arg1 + arg2, step):
|
2017-06-23 19:31:42 +00:00
|
|
|
mem = debug.memory_read(addr, step)
|
|
|
|
f.write(mem)
|
2017-02-20 13:36:00 +00:00
|
|
|
|
2016-05-26 20:20:34 +00:00
|
|
|
f.close()
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2019-04-15 14:15:28 +00:00
|
|
|
if __name__ == "__main__":
|
2016-05-26 20:20:34 +00:00
|
|
|
main()
|