[LAU] Reverse-engineering MIDI software
daniel.appelt at gmail.com
Tue Jun 23 09:46:15 CEST 2020
Am Di., 23. Juni 2020 um 08:43 Uhr schrieb Caelia Chapin <crc at caelia.net>:
> On Tue, Jun 23, 2020 at 12:19 AM Daniel Appelt <daniel.appelt at gmail.com>
>> Hi Caelia!
>> I was using a regular Windows machine using USBPcap and Wireshark to do a
>> similar job. I put down some notes on how to capture the raw data in this
> Ah, yes, Wireshark. I've used it a bit in the past for some very basic
> network troubleshooting, but I've never learned to use it very well. Maybe
> I will now.
> Apart from that the sysex specification (also reverse engineered ) for the
>> Arturia Beatstep might be of interest to you:
> Great, I'll check that out!
In the comments on that last page someone mentions the MIDI console inside
Arturia's app. This seems to log all messages (including sysex) sent and
received from a connected device. This should make things much easier.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Linux-audio-user