2 # GoodFET SPI Flash Client
4 # (C) 2012 Travis Goodspeed <travis at radiantmachines.com>
8 # 1) getting hot reads on frequency
9 # 2) allow sniffing in "normal" mode to get ack bits
10 # --check if that's whats causing error flags in board-to-board transmission
17 import csv, time, argparse;
20 from random import randrange
21 from GoodFETMCPCAN import GoodFETMCPCAN;
22 from intelhex import IntelHex;
25 class GoodFETMCPCANCommunication:
28 self.client=GoodFETMCPCAN();
30 self.client.MCPsetup();
31 self.DATALOCATION = "../../contrib/ThayerData/"
37 self.client.MCPreqstatConfiguration();
39 print "MCP2515 Info:\n\n";
41 print "Mode: %s" % self.client.MCPcanstatstr();
42 print "Read Status: %02x" % self.client.MCPreadstatus();
43 print "Rx Status: %02x" % self.client.MCPrxstatus();
44 print "Error Flags: %02x" % self.client.peek8(0x2D);
45 print "Tx Errors: %3d" % self.client.peek8(0x1c);
46 print "Rx Errors: %3d\n" % self.client.peek8(0x1d);
49 print "CNF1: %02x" %self.client.peek8(0x2a);
50 print "CNF2: %02x" %self.client.peek8(0x29);
51 print "CNF3: %02x\n" %self.client.peek8(0x28);
52 print "RXB0 CTRL: %02x" %self.client.peek8(0x60);
53 print "RXB1 CTRL: %02x" %self.client.peek8(0x70);
56 print "RXB0: %02x" %self.client.peek8(0x60);
57 print "RXB1: %02x" %self.client.peek8(0x70);
58 print "RXB0 masks: %02x, %02x, %02x, %02x" %(self.client.peek8(0x20), self.client.peek8(0x21), self.client.peek8(0x22), self.client.peek8(0x23));
59 print "RXB1 masks: %02x, %02x, %02x, %02x" %(self.client.peek8(0x24), self.client.peek8(0x25), self.client.peek8(0x26), self.client.peek8(0x27));
63 packet0=self.client.readrxbuffer(0);
64 packet1=self.client.readrxbuffer(1);
65 for foo in [packet0, packet1]:
66 print self.client.packet2str(foo);
69 self.client.MCPsetup();
72 ##########################
74 ##########################
76 def sniff(self,freq,duration,description, verbose=True, comment=None, filename=None, standardid=None, debug=False, faster=False, parsed=True, data = None):
78 #reset eveything on the chip
82 #### ON-CHIP FILTERING
83 if(standardid != None):
86 self.client.MCPreqstatConfiguration();
87 self.client.poke8(0x60,0x26); # set RXB0 CTRL register to ONLY accept STANDARD messages with filter match (RXM1=0, RMX0=1, BUKT=1)
88 self.client.poke8(0x20,0xFF); #set buffer 0 mask 1 (SID 10:3) to FF
89 self.client.poke8(0x21,0xE0); #set buffer 0 mask 2 bits 7:5 (SID 2:0) to 1s
90 if(len(standardid)>2):
91 self.client.poke8(0x70,0x20); # set RXB1 CTRL register to ONLY accept STANDARD messages with filter match (RXM1=0, RMX0=1)
92 self.client.poke8(0x24,0xFF); #set buffer 1 mask 1 (SID 10:3) to FF
93 self.client.poke8(0x25,0xE0); #set buffer 1 mask 2 bits 7:5 (SID 2:0) to 1s
95 for filter,ID in enumerate(standardid):
116 #### split SID into different regs
117 SIDlow = (ID & 0x07) << 5; # get SID bits 2:0, rotate them to bits 7:5
118 SIDhigh = (ID >> 3) & 0xFF; # get SID bits 10:3, rotate them to bits 7:0
121 self.client.poke8(RXFSIDH,SIDhigh);
122 self.client.poke8(RXFSIDL, SIDlow);
124 if (verbose == True):
125 print "Filtering for SID %d (0x%02xh) with filter #%d"%(ID, ID, filter);
126 comment += ("f%d" %(ID))
129 self.client.MCPsetrate(freq);
131 # This will handle the files so that we do not loose them. each day we will create a new csv file
133 #get folder information (based on today's date)
134 now = datetime.datetime.now()
135 datestr = now.strftime("%Y%m%d")
136 path = self.DATALOCATION+datestr+".csv"
140 outfile = open(filename,'a');
141 dataWriter = csv.writer(outfile,delimiter=',');
142 dataWriter.writerow(['# Time Error Bytes 1-13']);
143 dataWriter.writerow(['#' + description])
145 self.client.MCPreqstatNormal();
146 print "Listening...";
148 starttime = time.time();
150 while((time.time()-starttime < duration)):
153 packet=self.client.fastrxpacket();
155 packet=self.client.rxpacket();
157 #add the data to list if the pointer was included
158 if(data != None and packet != None):
159 #data.append(self.client.packet2parsedstr(packet))
160 packetParsed = self.client.packet2parsed(packet)
161 packetParsed["time"] =time.time()
162 data.put(packetParsed)
165 MCPstatusReg = self.client.MCPrxstatus();
166 messagestat=MCPstatusReg&0xC0;
167 messagetype=MCPstatusReg&0x18;
168 if(messagestat == 0xC0):
169 print "Message in both buffers; message type is %02x (0x00 is standard data, 0x08 is standard remote)." %messagetype
170 elif(messagestat == 0x80):
171 print "Message in RXB1; message type is %02x (0x00 is standard data, 0x08 is standard remote)." %messagetype
172 elif(messagestat == 0x40):
173 print "Message in RXB0; message type is %02x (0x00 is standard data, 0x08 is standard remote)." %messagetype
174 elif(messagestat == 0x00):
175 print "No messages in buffers."
181 row.append("%f"%time.time());
184 #if we want to print a parsed message
186 packetParsed = self.client.packet2parsed(packet)
187 sId = packetParsed.get('sID')
188 msg = "sID: %04d" %sId
189 if( packetParsed.get('eID')):
190 msg += " eID: %d" %packetParsed.get('eID')
191 msg += " rtr: %d"%packetParsed['rtr']
192 length = packetParsed['length']
193 msg += " length: %d"%length
195 for i in range(0,length):
197 msg +=" %03d"% ord(packetParsed[dbidx])
198 #msg = self.client.packet2parsedstr(packet)
200 # if we want to print just the message as it is read off the chip
202 print self.client.packet2str(packet)
207 MCPeflgReg=self.client.peek8(0x2D);
208 print"EFLG register equals: %x" %MCPeflgReg;
209 if((MCPeflgReg & 0xC0)==0xC0):
210 print "WARNING: BOTH overflow flags set. Missed a packet. Clearing and proceeding."
211 elif(MCPeflgReg & 0x80):
212 print "WARNING: RXB1 overflow flag set. A packet has been missed. Clearing and proceeding."
213 elif(MCPeflgReg & 0x40):
214 print "WARNING: RXB0 overflow flag set. A packet has been missed. Clearing and proceeding."
215 self.client.MCPbitmodify(0x2D,0xC0,0x00);
216 print"EFLG register set to: %x" % self.client.peek(0x2D);
219 if (self.client.peek8(0x2C) & 0x80):
220 self.client.MCPbitmodify(0x2C,0x80,0x00);
221 print "ERROR: Malformed packet recieved: " + self.client.packet2str(packet);
226 row.append(0); #since we don't check for errors if we're not in debug mode...
229 #how long the sniff was for
231 #boolean that tells us if there was filtering. 0 == no filters, 1 == filters
232 if(standardid != None):
236 #write packet to file
238 row.append("%02x"%ord(byte));
239 dataWriter.writerow(row);
242 print "Listened for %d seconds, captured %d packets." %(duration,packetcount);
246 def filterStdSweep(self, freq, low, high, time = 5):
248 self.client.serInit()
249 self.client.MCPsetup()
250 for i in range(low, high+1, 6):
251 print "sniffing id: %d, %d, %d, %d, %d, %d" % (i,i+1,i+2,i+3,i+4,i+5)
252 comment= "sweepFilter: "
253 #comment = "sweepFilter_%d_%d_%d_%d_%d_%d" % (i,i+1,i+2,i+3,i+4,i+5)
254 description = "Running a sweep filer for all the possible standard IDs. This run filters for: %d, %d, %d, %d, %d, %d" % (i,i+1,i+2,i+3,i+4,i+5)
255 count = self.sniff(freq=freq, duration = time, description = description,comment = comment, standardid = [i, i+1, i+2, i+3, i+4, i+5])
257 for j in range(i,i+5):
258 comment = "sweepFilter: "
259 #comment = "sweepFilter: %d" % (j)
260 description = "Running a sweep filer for all the possible standard IDs. This run filters for: %d " % j
261 count = self.sniff(freq=freq, duration = time, description = description,comment = comment, standardid = [j, j, j, j])
266 def sweepRandom(self, freq, number = 5, time = 200):
269 self.client.serInit()
270 self.client.MCPsetup()
271 for i in range(0,number+1,6):
273 comment = "sweepFilter: "
274 for j in range(0,6,1):
276 #comment += "_%d" % id
280 description = "Running a sweep filer for all the possible standard IDs. This runs the following : " + comment
281 count = self.sniff(freq=freq, duration=time, description=description, comment = comment, standardid = idsTemp)
283 for element in idsTemp:
284 #comment = "sweepFilter: %d" % (element)
285 comment="sweepFilter: "
286 description = "Running a sweep filer for all the possible standard IDs. This run filters for: %d " % element
287 count = self.sniff(freq=freq, duration = time, description = description,comment = comment, standardid = [element, element, element])
292 def sniffTest(self, freq):
296 print "Calling MCPsetrate for %i." %rate;
297 self.client.MCPsetrate(rate);
298 self.client.MCPreqstatNormal();
300 print "Mode: %s" % self.client.MCPcanstatstr();
301 print "CNF1: %02x" %self.client.peek8(0x2a);
302 print "CNF2: %02x" %self.client.peek8(0x29);
303 print "CNF3: %02x\n" %self.client.peek8(0x28);
306 packet=self.client.rxpacket();
309 if (self.client.peek8(0x2C) & 0x80):
310 self.client.MCPbitmodify(0x2C,0x80,0x00);
311 print "malformed packet recieved: "+ self.client.packet2str(packet);
313 print "properly formatted packet recieved" + self.client.packet2str(packet);
316 def freqtest(self,freq):
318 self.client.MCPsetup();
320 self.client.MCPsetrate(freq);
321 self.client.MCPreqstatListenOnly();
323 print "CAN Freq Test: %3d kHz" %freq;
328 starttime = time.time();
329 while((time.time()-starttime < args.time)):
330 packet=self.client.rxpacket();
334 if (self.client.peek8(0x2C) & 0x80):
335 print "malformed packet recieved"
337 self.client.MCPbitmodify(0x2C,0x80,0x00);
339 print self.client.packet2str(packet);
341 print "Results for %3.1d kHz: recieved %3d packets, registered %3d RX errors." %(freq, x, errors);
344 def isniff(self,freq):
345 """ An intelligent sniffer, decodes message format """
346 """ More features to be added soon """
348 self.client.MCPsetrate(freq);
349 self.client.MCPreqstatListenOnly();
351 packet=self.client.rxpacket();
360 print "\nArbID: " + self.client.packet2str(arbid);
361 print "EID: " + self.client.packet2str(eid);
362 print "DLC: " + self.client.packet2str(dlc);
363 print "Data: " + self.client.packet2str(data);
368 print "Just reset..."
369 print "EFLG register: %02x" % self.client.peek8(0x2d);
370 print "Tx Errors: %3d" % self.client.peek8(0x1c);
371 print "Rx Errors: %3d" % self.client.peek8(0x1d);
372 print "CANINTF: %02x" %self.client.peek8(0x2C);
373 self.client.MCPreqstatConfiguration();
374 self.client.poke8(0x60,0x66);
375 self.client.MCPsetrate(500);
376 self.client.MCPreqstatNormal();
377 print "In normal mode now"
378 print "EFLG register: %02x" % self.client.peek8(0x2d);
379 print "Tx Errors: %3d" % self.client.peek8(0x1c);
380 print "Rx Errors: %3d" % self.client.peek8(0x1d);
381 print "CANINTF: %02x" %self.client.peek8(0x2C);
382 print "Waiting on packets.";
386 packet=self.client.rxpacket();
388 print "Message recieved: %s" % self.client.packet2str(packet);
390 checkcount=checkcount+1;
391 if (checkcount%30==0):
392 print "EFLG register: %02x" % self.client.peek8(0x2d);
393 print "Tx Errors: %3d" % self.client.peek8(0x1c);
394 print "Rx Errors: %3d" % self.client.peek8(0x1d);
395 print "CANINTF: %02x" %self.client.peek8(0x2C);
400 def addFilter(self,standardid, verbose= True):
402 ### ON-CHIP FILTERING
403 if(standardid != None):
404 self.client.MCPreqstatConfiguration();
405 self.client.poke8(0x60,0x26); # set RXB0 CTRL register to ONLY accept STANDARD messages with filter match (RXM1=0, RMX0=1, BUKT=1)
406 self.client.poke8(0x20,0xFF); #set buffer 0 mask 1 (SID 10:3) to FF
407 self.client.poke8(0x21,0xE0); #set buffer 0 mask 2 bits 7:5 (SID 2:0) to 1s
408 if(len(standardid)>2):
409 self.client.poke8(0x70,0x20); # set RXB1 CTRL register to ONLY accept STANDARD messages with filter match (RXM1=0, RMX0=1)
410 self.client.poke8(0x24,0xFF); #set buffer 1 mask 1 (SID 10:3) to FF
411 self.client.poke8(0x25,0xE0); #set buffer 1 mask 2 bits 7:5 (SID 2:0) to 1s
413 for filter,ID in enumerate(standardid):
434 #### split SID into different regs
435 SIDlow = (ID & 0x07) << 5; # get SID bits 2:0, rotate them to bits 7:5
436 SIDhigh = (ID >> 3) & 0xFF; # get SID bits 10:3, rotate them to bits 7:0
439 self.client.poke8(RXFSIDH,SIDhigh);
440 self.client.poke8(RXFSIDL, SIDlow);
442 if (verbose == True):
443 print "Filtering for SID %d (0x%02xh) with filter #%d"%(ID, ID, filter);
445 self.client.MCPreqstatNormal();
448 # this will sweep through the given ids to request a packet and then sniff on that
449 # id for a given amount duration. This will be repeated the number of attempts time
451 #at the moment this is set to switch to the next id once a message is identified
452 def rtrSweep(self,freq,lowID,highID, attempts = 1,duration = 1, verbose = True):
454 now = datetime.datetime.now()
455 datestr = now.strftime("%Y%m%d")
456 path = self.DATALOCATION+datestr+"_rtr.csv"
458 outfile = open(filename,'a');
459 dataWriter = csv.writer(outfile,delimiter=',');
460 dataWriter.writerow(['# Time Error Bytes 1-13']);
461 dataWriter.writerow(['#' + "rtr sweep from %d to %d"%(lowID,highID)])
463 #self.client.serInit()
464 #self.spitSetup(freq)
465 for i in range(lowID,highID+1, 1):
466 self.client.serInit()
468 standardid = [i, i, i, i]
470 self.addFilter(standardid, verbose = True)
472 #### split SID into different areas
473 SIDlow = (standardid[0] & 0x07) << 5; # get SID bits 2:0, rotate them to bits 7:5
474 SIDhigh = (standardid[0] >> 3) & 0xFF; # get SID bits 10:3, rotate them to bits 7:0
476 packet = [SIDhigh, SIDlow, 0x00,0x00,0x40]
477 dataWriter.writerow(["#requested id %d"%i])
478 #self.client.poke8(0x2C,0x00); #clear the CANINTF register; we care about bits 0 and 1 (RXnIF flags) which indicate a message is being held
480 packet1 = self.client.rxpacket();
481 packet2 = self.client.rxpacket();
483 self.client.txpacket(packet)
484 ## listen for 2 packets. one should be the rtr we requested the other should be
485 ## a new packet response
486 starttime = time.time()
487 while ((time.time() - starttime) < duration):
488 packet = self.client.rxpacket()
492 row.append("%f"%time.time()) #timestamp
493 row.append(0) #error flag (not checkign)
494 row.append("rtrRequest_%d"%i) #comment
495 row.append(duration) #sniff time
496 row.append(1) # filtering boolean
498 row.append("%02x"%ord(byte));
499 dataWriter.writerow(row)
500 print self.client.packet2parsedstr(packet)
501 # packet1=self.client.rxpacket();
502 # packet2=self.client.rxpacket();
503 # if( packet1 != None and packet2 != None):
504 # print "packets recieved :\n "
505 # print self.client.packet2parsedstr(packet1);
506 # print self.client.packet2parsedstr(packet2);
508 # elif( packet1 != None):
509 # print self.client.packet2parsedstr(packet1)
510 # elif( packet2 != None):
511 # print self.client.packet2parsedstr(packet2)
514 while( trial <= attempts):
515 print "trial: ", trial
516 self.client.MCPrts(TXB0=True);
517 starttime = time.time()
518 # this time we will sniff for the given amount of time to see if there is a
519 # time till the packets come in
520 while( (time.time()-starttime) < duration):
521 packet=self.client.rxpacket();
523 row.append("%f"%time.time()) #timestamp
524 row.append(0) #error flag (not checking)
525 row.append("rtrRequest_%d"%i) #comment
526 row.append(duration) #sniff time
527 row.append(1) # filtering boolean
529 row.append("%02x"%ord(byte));
530 dataWriter.writerow(row)
531 print self.client.packet2parsedstr(packet)
532 # packet2=self.client.rxpacket();
534 # if( packet1 != None and packet2 != None):
535 # print "packets recieved :\n "
536 # print self.client.packet2parsedstr(packet1);
537 # print self.client.packet2parsedstr(packet2);
539 # elif( packet1 != None):
540 # print "just packet1"
541 # print self.client.packet2parsedstr(packet1)
542 # elif( packet2 != None):
543 # print "just packet2"
544 # print self.client.packet2parsedstr(packet2)
546 print "sweep complete"
549 def spitSetup(self,freq):
551 self.client.MCPsetrate(freq);
552 self.client.MCPreqstatNormal();
555 def spitSingle(self,freq, standardid, repeat, duration = None, debug = False, packet = None):
556 self.spitSetup(freq);
557 spit(self,freq, standardid, repeat, duration = None, debug = False, packet = None)
559 def spit(self,freq, standardid, repeat, duration = None, debug = False, packet = None):
562 #### split SID into different regs
563 SIDlow = (standardid[0] & 0x07) << 5; # get SID bits 2:0, rotate them to bits 7:5
564 SIDhigh = (standardid[0] >> 3) & 0xFF; # get SID bits 10:3, rotate them to bits 7:0
568 # if no packet, RTR for inputted arbID
569 # so packet to transmit is SID + padding out EID registers + RTR request (set bit 6, clear lower nibble of DLC register)
570 packet = [SIDhigh, SIDlow, 0x00,0x00,0x40]
573 #packet = [SIDhigh, SIDlow, 0x00,0x00, # pad out EID regs
574 # 0x08, # bit 6 must be set to 0 for data frame (1 for RTR)
575 # # lower nibble is DLC
576 # 0x00,0x01,0x02,0x03,0x04,0x05,0x06,0xFF]
579 # if we do have a packet, packet is SID + padding out EID registers + DLC of 8 + packet
581 # TODO: allow for variable-length packets
583 packet = [SIDhigh, SIDlow, 0x00,0x00, # pad out EID regs
584 0x08, # bit 6 must be set to 0 for data frame (1 for RTR)
585 # lower nibble is DLC
586 packet[0],packet[1],packet[2],packet[3],packet[4],packet[5],packet[6],packet[7]]
590 if self.client.MCPcanstat()>>5!=0:
591 print "Warning: currently in %s mode. NOT in normal mode! May not transmit.\n" %self.client.MCPcanstatstr();
592 print "\nInitial state:"
593 print "Tx Errors: %3d" % self.client.peek8(0x1c);
594 print "Rx Errors: %3d" % self.client.peek8(0x1d);
595 print "Error Flags: %02x\n" % self.client.peek8(0x2d);
596 print "TXB0CTRL: %02x" %self.client.peek8(0x30);
597 print "CANINTF: %02x\n" %self.client.peek8(0x2C);
598 print "\n\nATTEMPTING TRANSMISSION!!!"
601 print "Transmitting packet: "
602 #print self.client.packet2str(packet)
604 self.client.txpacket(packet);
607 print "\nNow looping on transmit. "
609 starttime = time.time();
610 while((time.time()-starttime < duration)):
611 self.client.MCPrts(TXB0=True);
615 self.client.MCPrts(TXB0=True);
616 print "messages injected"
621 TXB0CTRL = self.client.peek8(0x30);
623 print "Tx Errors: %3d" % self.client.peek8(0x1c);
624 print "Rx Errors: %3d" % self.client.peek8(0x1d);
625 print "EFLG register: %02x" % self.client.peek8(0x2d);
626 print "TXB0CTRL: %02x" %TXB0CTRL;
627 print "CANINTF: %02x\n" %self.client.peek8(0x2C);
629 while(TXB0CTRL | 0x00 != 0x00):
631 TXB0CTRL = self.client.peek8(0x30);
632 if (checkcount %30 ==0):
633 print "Tx Errors: %3d" % self.client.peek8(0x1c);
634 print "Rx Errors: %3d" % self.client.peek8(0x1d);
635 print "EFLG register: %02x" % self.client.peek8(0x2d);
636 print "TXB0CTRL: %02x" %TXB0CTRL;
637 print "CANINTF: %02x\n" %self.client.peek8(0x2C);
640 def setRate(self,freq):
641 self.client.MCPsetrate(freq);
646 if __name__ == "__main__":
648 parser = argparse.ArgumentParser(formatter_class=argparse.RawDescriptionHelpFormatter,description='''\
650 Run commands on the MCP2515. Valid commands are:
654 peek 0x(start) [0x(stop)]
664 parser.add_argument('verb', choices=['info', 'test','peek', 'reset', 'sniff', 'freqtest','snifftest', 'spit']);
665 parser.add_argument('-f', '--freq', type=int, default=500, help='The desired frequency (kHz)', choices=[100, 125, 250, 500, 1000]);
666 parser.add_argument('-t','--time', type=int, default=15, help='The duration to run the command (s)');
667 parser.add_argument('-o', '--output', default=None,help='Output file');
668 parser.add_argument("-d", "--description", help='Description of experiment (included in the output file)', default="");
669 parser.add_argument('-v',"--verbose",action='store_false',help='-v will stop packet output to terminal', default=True);
670 parser.add_argument('-c','--comment', help='Comment attached to ech packet uploaded',default=None);
671 parser.add_argument('-b', '--debug', action='store_true', help='-b will turn on debug mode, printing packet status', default=False);
672 parser.add_argument('-a', '--standardid', type=int, action='append', help='Standard ID to accept with filter 0 [1, 2, 3, 4, 5]', default=None);
673 parser.add_argument('-x', '--faster', action='store_true', help='-x will use "fast packet recieve," which may duplicate packets and/or cause other weird behavior.', default=False);
674 parser.add_argument('-r', '--repeat', action='store_true', help='-r with "spit" will continuously send the inputted packet. This will put the GoodTHOPTHER into an infinite loop.', default=False);
677 args = parser.parse_args();
680 filename = args.output
681 description = args.description
682 verbose = args.verbose
683 comments = args.comment
685 standardid = args.standardid
689 comm = GoodFETMCPCANCommunication();
691 ##########################
693 ##########################
695 # Prints MCP state info
697 if(args.verb=="info"):
701 ##########################
703 ##########################
707 if(args.verb=="reset"):
710 ##########################
712 ##########################
714 # runs in ListenOnly mode
715 # utility function to pull info off the car's CAN bus
718 if(args.verb=="sniff"):
719 comm.sniff(freq=freq,duration=duration,description=description,verbose=verbose,comment=comments,filename=filename, standardid=standardid, debug=debug, faster=faster)
721 ##########################
723 ##########################
725 # runs in NORMAL mode
726 # intended for NETWORKED MCP chips to verify proper operation
729 if(args.verb=="snifftest"):
730 comm.sniffTest(freq=freq)
733 ##########################
735 ##########################
737 # runs in LISTEN ONLY mode
738 # tests bus for desired frequency --> sniffs bus for specified length of time and reports
739 # if packets were properly formatted
743 if(args.verb=="freqtest"):
744 comm.freqtest(freq=freq)
748 ##########################
750 ##########################
752 # """ An intelligent sniffer, decodes message format """
753 # """ More features to be added soon """
754 if(args.verb=="isniff"):
755 comm.isniff(freq=freq)
758 ##########################
760 ##########################
762 # Runs in LOOPBACK mode
763 # self-check diagnostic
764 # wasn't working before due to improperly formatted packet
766 # ...add automatic packet check rather than making user verify successful packet
767 if(args.verb=="test"):
770 if(args.verb=="peek"):
773 start=int(sys.argv[2],16);
776 stop=int(sys.argv[3],16);
777 print "Peeking from %04x to %04x." % (start,stop);
779 print "%04x: %02x" % (start,client.peek8(start));
782 ##########################
784 ##########################
786 # Basic packet transmission
787 # runs in NORMAL MODE!
789 # checking TX error flags--> currently throwing error flags on every
790 # transmission (travis thinks this is because we're sniffing in listen-only
791 # and thus not generating an ack bit on the recieving board)
792 if(args.verb=="spit"):
793 comm.spitSingle(freq=freq, standardid=standardid,duration=duration, repeat=repeat, debug=debug)