mykeepon-hacking

Reverse Engineering MyKeepon

[qDot] recently got his hands on a MyKeepon toy and after messing with it a bit, decided to tear it down to see what was inside. He had hopes of easily modding the toy, but like most adventures in hacking, things might take a while longer than he first imagined.

In his teardown you can see the various components that make up the MyKeepon, including a trio of motors for movement, along with a series of buttons and a microphone used to interact with the toy. Of course, the part that interested him the most was MyKeepon’s circuit board, since that’s where the real work would begin.

There, he discovered two main processor Padauk processor chips, described as “Field Programmable Processor Arrays” in their data sheets. He says that the brand is well known for lifting text verbatim from PIC data sheets, so he doesn’t have a ton of faith in what’s printed there. Sketchy documentation aside, he poked around on the I2C bus connecting the two chips and was able to sniff a bit of traffic. He is documenting his findings as he goes along, which you can see more of on his Github project site.

He has made a few simple modifications to the toy already, but there’s plenty more to do before he has complete control over it. His work is bound to make tons of MyKeepon fans happy, including our own [Caleb Kraft], whose love for the toy can be seen in the video below taken at last year’s CES.

Continue reading “Reverse Engineering MyKeepon”