[LAU] Reverse-engineering MIDI software

Daniel Appelt daniel.appelt at gmail.com
Tue Jun 23 09:46:15 CEST 2020

Am Di., 23. Juni 2020 um 08:43 Uhr schrieb Caelia Chapin <crc at caelia.net>:

> On Tue, Jun 23, 2020 at 12:19 AM Daniel Appelt <daniel.appelt at gmail.com>
> wrote:
>> Hi Caelia!
>> I was using a regular Windows machine using USBPcap and Wireshark to do a
>> similar job. I put down some notes on how to capture the raw data in this
>> document:
>> https://docs.google.com/document/d/1ypQkMvLO4bLtitymOyH06OrK4obAxps7OTFmCKdcPUc/edit?usp=sharing
> Ah, yes, Wireshark. I've used it a bit in the past for some very basic
> network troubleshooting, but I've never learned to use it very well. Maybe
> I will now.
> Apart from that the sysex specification (also reverse engineered ) for the
>> Arturia Beatstep might be of interest to you:
>> https://www.untergeek.de/de/2014/11/taming-arturias-beatstep-sysex-codes-for-programming-via-ipad/
> Great, I'll check that out!

In the comments on that last page someone mentions the MIDI console inside
Arturia's app. This seems to log all messages (including sysex) sent and
received from a connected device. This should make things much easier.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.linuxaudio.org/archives/linux-audio-user/attachments/20200623/5c8e757e/attachment.html>

More information about the Linux-audio-user mailing list