Re: [LAU] Reverse-engineering MIDI software

From: Daniel Appelt <daniel.appelt@email-addr-hidden>
Date: Tue Jun 23 2020 - 10:46:15 EEST

Am Di., 23. Juni 2020 um 08:43 Uhr schrieb Caelia Chapin <crc@email-addr-hidden>:

>
> On Tue, Jun 23, 2020 at 12:19 AM Daniel Appelt <daniel.appelt@email-addr-hidden>
> wrote:
>
>> Hi Caelia!
>>
>> I was using a regular Windows machine using USBPcap and Wireshark to do a
>> similar job. I put down some notes on how to capture the raw data in this
>> document:
>>
>> https://docs.google.com/document/d/1ypQkMvLO4bLtitymOyH06OrK4obAxps7OTFmCKdcPUc/edit?usp=sharing
>>
>
> Ah, yes, Wireshark. I've used it a bit in the past for some very basic
> network troubleshooting, but I've never learned to use it very well. Maybe
> I will now.
>
> Apart from that the sysex specification (also reverse engineered ) for the
>> Arturia Beatstep might be of interest to you:
>>
>> https://www.untergeek.de/de/2014/11/taming-arturias-beatstep-sysex-codes-for-programming-via-ipad/
>>
>
> Great, I'll check that out!
>

In the comments on that last page someone mentions the MIDI console inside
Arturia's app. This seems to log all messages (including sysex) sent and
received from a connected device. This should make things much easier.

Cheers,
Daniel

_______________________________________________
Linux-audio-user mailing list
Linux-audio-user@lists.linuxaudio.org
https://lists.linuxaudio.org/listinfo/linux-audio-user
Received on Wed Jun 24 04:15:02 2020

This archive was generated by hypermail 2.1.8 : Wed Jun 24 2020 - 04:15:02 EEST