Quote:
Originally Posted by packet.pilot
K-TAG clones are pretty cheap at around $200 iirc. I'd only need it for unlocking afaik and then would be using Infineon Memtool and the DAP miniWiggler to interface with the board via the JTAG headers unsoldered on, or so I hope. I should be able to find one nearby to borrow. I suppose I misread @su_root's offer to lend it out.
To reverse the EVC open/close messages, I used an OTS EVC as well as a saleae logic analyzer and their Logic app.
|
Quote:
Originally Posted by Mikecom32
su_root and packet pilot have you guys had a chance to work on this any more?
I'm also an IT guy with an interest in embedded systems and poking around. Curious to see how you've made out.
|
What do you guys make of the OBD-II flashing methods? It's just sending OBD-II commands to initiate a file transfer sequence... right? Can they be reverse engineered with an OBD-II bypass tool (like making pins that match the OBD-II connection, putting an Arduino/Raspberry-Pi in between, and logging what happens) or by reading the writes made to the USB device from the VR Flash tool?