Re: Reverse-engineering MIDI software

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Am Di., 23. Juni 2020 um 08:43 Uhr schrieb Caelia Chapin <crc@xxxxxxxxxx>:

On Tue, Jun 23, 2020 at 12:19 AM Daniel Appelt <daniel.appelt@xxxxxxxxx> wrote:
Hi Caelia!

I was using a regular Windows machine using USBPcap and Wireshark to do a similar job. I put down some notes on how to capture the raw data in this document:
https://docs.google.com/document/d/1ypQkMvLO4bLtitymOyH06OrK4obAxps7OTFmCKdcPUc/edit?usp=sharing

Ah, yes, Wireshark. I've used it a bit in the past for some very basic network troubleshooting, but I've never learned to use it very well. Maybe I will now.

Apart from that the sysex specification (also reverse engineered ) for the Arturia Beatstep might be of interest to you:
https://www.untergeek.de/de/2014/11/taming-arturias-beatstep-sysex-codes-for-programming-via-ipad/

Great, I'll check that out!

In the comments on that last page someone mentions the MIDI console inside Arturia's app. This seems to log all messages (including sysex) sent and received from a connected device. This should make things much easier.

Cheers,
Daniel
_______________________________________________
Linux-audio-user mailing list
Linux-audio-user@xxxxxxxxxxxxxxxxxxxx
https://lists.linuxaudio.org/listinfo/linux-audio-user

[Index of Archives]     [Linux Sound]     [ALSA Users]     [Pulse Audio]     [ALSA Devel]     [Sox Users]     [Linux Media]     [Kernel]     [Photo Sharing]     [Gimp]     [Yosemite News]     [Linux Media]

  Powered by Linux