Difference between revisions of "Equipment/Bus Pirate"

From London Hackspace Wiki
Jump to navigation Jump to search
m
 
(2 intermediate revisions by the same user not shown)
Line 83: Line 83:
 
  + *      MISO  <->  MISO
 
  + *      MISO  <->  MISO
 
  + *  SCL/CLK  <->  SCK
 
  + *  SCL/CLK  <->  SCK
 +
 +
Information about the schematics to use with any of the supported protocols can be found here [http://dangerousprototypes.com/docs/images/1/1b/Bp-pin-cable-color.png]
 +
 +
=== How to get a shell anything UART ===
 +
Follow this step to get a shell using the bus pirate to you UART devices.
 +
* First find the UART baud rate for the device. You can generally find this information from the constructors manual or using an oscilloscope.Note it on a piece of paper.
 +
* Find the connecting plug for it. Need some magic here. It mostly trying to find the GND first using tester and trying to find the voltage pin and data pin.
 +
* Connect you bus pirate to your device.
 +
* Find the new device using 'ls /dev/tty*'
 +
* Start a shell. Either trough minicom or screen.
 +
* m ( for mode)
 +
* 3 (for selecting the UART but you can select another mode if you need another protocol)
 +
* select your baud rate ( most common baud rate are 9600 or 115200)
 +
* default work in most of the case to get your shell on any devices 8
 +
* select stop bits is 1 most of the case
 +
* enjoy your shell.
  
 
== Real life example ==
 
== Real life example ==

Latest revision as of 12:12, 8 August 2022

Bus pirate
Hackspace Unknown.png
Model Unknown
Sub-category Test equipment
Status Good working order
Last updated 8 August 2022 12:12:30
Consumables Unknown
Accessories Unknown
Training link Unknown
Owner Unknown
Origin Unknown
Location Ground floor, electronics bench

Bus Pirate

Description

The Bus Pirate is a low-level interface to:

  • 1-Wire
  • UART
  • I2C
  • SPI
  • JTAG
  • raw 2-wire
  • raw 3-wire
  • PC keyboard
  • HD44780 LCDs
  • MIDI

It includes an ADC and can bit bash these protocols at the wire level. It can also be put into UART bridge mode, acting as a simple serial port.

Reference

Our connector

brown - GND		
red - +3.3			 
orange - +5	
yellow - ADC		 
green - VPU		
blue - AUX
purple - CLK		
grey - MOSI		
white - CS			
black - MISO

NB This order depends on attachment as connector is symmetrical and may be inverted.

Sparkfun Connectors

I have noticed that the sparkfun connector and buspirate uses the following mappings

black – gnd
white – 3.3V
grey – 5V
purple – ADC
blue – VExtern
green – aux1
yellow – clk
orange – MOSI
red – CS
brown – MISO

AVRDude bus pirate mappings

+ * BusPirate       AVR Chip 
+ * ---------       --------
+ *       GND  <->  GND
+ *       +5V  <->  Vcc
+ *        CS  <->  RESET
+ *      MOSI  <->  MOSI
+ *      MISO  <->  MISO
+ *   SCL/CLK  <->  SCK

Information about the schematics to use with any of the supported protocols can be found here [1]

How to get a shell anything UART

Follow this step to get a shell using the bus pirate to you UART devices.

  • First find the UART baud rate for the device. You can generally find this information from the constructors manual or using an oscilloscope.Note it on a piece of paper.
  • Find the connecting plug for it. Need some magic here. It mostly trying to find the GND first using tester and trying to find the voltage pin and data pin.
  • Connect you bus pirate to your device.
  • Find the new device using 'ls /dev/tty*'
  • Start a shell. Either trough minicom or screen.
  • m ( for mode)
  • 3 (for selecting the UART but you can select another mode if you need another protocol)
  • select your baud rate ( most common baud rate are 9600 or 115200)
  • default work in most of the case to get your shell on any devices 8
  • select stop bits is 1 most of the case
  • enjoy your shell.

Real life example

As it happened at the LHS, the bus pirate interacting with a Hitachi HM55B compass module:

Projects/HM55B