python-trezor/tools/mem_read.py

52 lines
1.3 KiB
Python
Raw Normal View History

#!/usr/bin/env python3
2016-05-26 13:20:34 -07:00
from __future__ import print_function
from trezorlib.debuglink import DebugLink
2017-06-23 12:31:42 -07:00
from trezorlib.client import TrezorClient
2016-05-26 13:20:34 -07:00
from trezorlib.transport_hid import HidTransport
import sys
# usage examples
# read entire bootloader: ./mem_read.py 8000000 8000
# read initial stack pointer: ./mem_read.py 8000000 4
# an entire bootloader can be later disassembled with:
# arm-none-eabi-objdump -D -b binary -m arm -M force-thumb memory.dat
# note that in order for this to work, your trezor device must
# be running a firmware that was built with debug link enabled
2017-06-23 12:31:42 -07:00
2016-05-26 13:20:34 -07:00
def main():
# List all connected TREZORs on USB
devices = HidTransport.enumerate()
# Check whether we found any
if len(devices) == 0:
print('No TREZOR found')
return
# Use first connected device
2017-09-04 04:36:31 -07:00
transport = devices[0]
debug_transport = devices[0].find_debug()
2016-05-26 13:20:34 -07:00
# Creates object for manipulating TREZOR
client = TrezorClient(transport)
debug = DebugLink(debug_transport)
arg1 = int(sys.argv[1], 16)
arg2 = int(sys.argv[2], 16)
step = 0x400 if arg2 >= 0x400 else arg2
f = open('memory.dat', 'wb')
for addr in range(arg1, arg1 + arg2, step):
2017-06-23 12:31:42 -07:00
mem = debug.memory_read(addr, step)
f.write(mem)
2016-05-26 13:20:34 -07:00
f.close()
client.close()
2017-06-23 12:31:42 -07:00
2016-05-26 13:20:34 -07:00
if __name__ == '__main__':
main()