I access DRYOS of the printer shell(Serial port UART)
Use command XD to get binary code(00000000-00ffffff & ff000000-ffffffff & f8400000-f8700000)
Did not find some keyword strings, such as gaonisoyP
If the ROM address cannot be determined, I directly use ghidra arm v7 reverse engineering
(00000000-00ffffff & ff000000-ffffffff & f8400000-f8700000)
I downloaded the firmware update files Disassemble into srecode
The firmware update file is found and the data is stored in 0XF8400000-0XF8700000
I want to find the signal communication between the ink cartridge and the printer
Some USB transfers currently known are transferred to the computer at 0x000358b4(INK status)
Currently using ADI reverse Xtensa 0x00000000-0X00ffffff
Is Xtensa the main architecture of DRYOS?
If not, does anyone currently know what he is doing
If there is something that is not doing well, please tell me I will improve it
binary is too big to upload, if you need it, please tell me that I can send it to you
(0X00000000-0x00FFFFFF 16.384KB )
(0xf8400000-f8700000 4096KB)
(0XFF000000-0xFFFFFFFF 16.384KB )