[LAU] Reverse-engineering MIDI software
Daniel Appelt
daniel.appelt at gmail.com
Tue Jun 23 09:46:15 CEST 2020
Am Di., 23. Juni 2020 um 08:43 Uhr schrieb Caelia Chapin <crc at caelia.net>:
>
> On Tue, Jun 23, 2020 at 12:19 AM Daniel Appelt <daniel.appelt at gmail.com>
> wrote:
>
>> Hi Caelia!
>>
>> I was using a regular Windows machine using USBPcap and Wireshark to do a
>> similar job. I put down some notes on how to capture the raw data in this
>> document:
>>
>> https://docs.google.com/document/d/1ypQkMvLO4bLtitymOyH06OrK4obAxps7OTFmCKdcPUc/edit?usp=sharing
>>
>
> Ah, yes, Wireshark. I've used it a bit in the past for some very basic
> network troubleshooting, but I've never learned to use it very well. Maybe
> I will now.
>
> Apart from that the sysex specification (also reverse engineered ) for the
>> Arturia Beatstep might be of interest to you:
>>
>> https://www.untergeek.de/de/2014/11/taming-arturias-beatstep-sysex-codes-for-programming-via-ipad/
>>
>
> Great, I'll check that out!
>
In the comments on that last page someone mentions the MIDI console inside
Arturia's app. This seems to log all messages (including sysex) sent and
received from a connected device. This should make things much easier.
Cheers,
Daniel
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.linuxaudio.org/archives/linux-audio-user/attachments/20200623/5c8e757e/attachment.html>
More information about the Linux-audio-user
mailing list