Nokia LCD, Nunchuck, And MSP430 Join Forces

[JB’s] driving a Nokia 6100 LCD using an MSP430 with input from a Wii Nunchuck. He’s using the G2211 microprocessor that came with the Launchpad, and developing his code with MSP-GCC. As you can see in the video after the break, this works but there’s some room for improvement. That’s being said, he is bumping up against the code memory limit, with just around 500 bytes left to work with. The LCD screen is SPI and currently it’s hogging the pins that are used for the hardware i2c. Since he needs an i2c bus to talk to the nunchuck he had to go with software i2c which explains part of his program memory troubles.

We’re in no way experts on this, but it seems like he could save space (and improve the input responsiveness) by rewriting his LCD drivers in order to remap the pins. Then again, it might just be better to move up to a larger MSP430. If you’ve got some advice, make sure to share it by leaving a comment.

Continue reading “Nokia LCD, Nunchuck, And MSP430 Join Forces”

Hacking A Hack: Disassembly And Sniffing Of IM-ME Binary

It’s fun to pick apart code, but it gets more difficult when you’re talking about binaries. [Joby Taffey] opened up the secrets to one of [Travis Goodspeed’s] hacks by disassembling and sniffing the data from a Zombie Gotcha game binary.

We looked in on [Travis’] work yesterday at creating a game using sprites on the IM-ME. He challenged readers to extract the 1-bit sprites from an iHex binary and that’s what got [Joby] started. He first tried to sniff the LCD data traces using a Bus Pirate but soon found the clock signal was much too fast for the device to reliably capture the signals. After looking into available source code from other IM-ME hacks [Joby] found how the SPI baud rate is set, then went to work searching for that in a disassembly of [Travis’] binary. Once found, he worked through the math necessary to slow down communication from 2.7 Mbit/s to 2400 bps and altered the binary data to match that change. This slower speed is more amenable to the Bus Pirate’s capabilities and allowed him to dump the sprite data as it was sent to the LCD screen.

[Thanks Travis]

Touring The Available Nokia LCD Screens

[Rossum’s] taking a look at the Nokia LCD screens that are both plentiful and begging to be bent to your will. For quite some time the Nokia 6100 screens have been used in a lot hacks, but he wanted to see what else is out there. He digs into his junk box of cell phones and comes up with a couple to test; the Nokia 6101 and Nokia 2760. The screens use a 3-wire SPI interface, which he sniffs out with a logic analyzer. At power-up the cellphone polls the screen to determine which type of LCD controller is connected. [Rossum] grabs these commands from the logic analyzer and uses it to determine the hardware in use with each screen.

He made himself a nice breakout board which has connectors for several different screens. The firmware he’s using detects when a screen is attached and switches to the applicable protocol for that display. Take a look at the video after the break.

Continue reading “Touring The Available Nokia LCD Screens”

Spy Video TRAKR: Software And First Hack

Our initial view of the Spy Video TRAKR “App BUILDR” site had us believing this would be an internet-based code editor and compiler, similar to the mbed microcontroller development tools. Delving deeper into the available resources, we’re not entirely sure that’s an accurate assessment — TRAKR may well permit or even require offline development after all. Regardless of the final plan, in the interim we have sniffed out the early documentation, libraries and standalone C compiler and have beaten it into submission for your entertainment, in order to produce our first TRAKR hack!

Continue reading “Spy Video TRAKR: Software And First Hack”

2 Foot Tall POV Globe

[Ytai] let us know about his POV globe, all four parts of its current progress. While he says he was inspired to write up the project from a YouTube clip, we know the real reason. Regardless, the plan is to have a 2 foot diameter globe with 256 LEDs spinning at 50 revolutions per second streaming images from an SD card using SPI. While the project isn’t completed yet, we know [Ytai] will pull through like he has in the past, and you can be sure we’ll keep you up to date on his progress.

Wireless Presenters Easily Cracked

While hacking a wireless presenter doesn’t sound like something worthwhile or interesting, [Niels Teusink] demonstrates that these little devices often are a lot more powerful than we give them credit.

With an Arduino, plenty of research, and some heavy sniffing of a wireless presenter’s SPI and then wireless interface [Niels] is able to emulate an entire keyboard. Sending commands as harmless as “next slide” to the devastating “[Win+R] Format C:”. Hopefully anyone planning such a project at the next Apple or Microsoft keynote just intends some gentle fun.

Related: Wireless keyboards easily cracked.

[Thanks Dan Ransom]

IM-ME Screen Reverse Engineered

[Dave] figured out the command set for the IM-ME terminal. It took a bit of sleuthing to get this pink plastic peripheral to give up these secrets. He used an oscilloscope to sniff out the SPI connections, then used a hacked IM-ME to capture the traffic from a factory-fresh unit. He managed to extrapolate how write data was being sent but he still couldn’t figure out how commands were differentiated from that data. With the info at hand he searched around the interwebs to find that the screen uses an ST7565S controller. Now he’s got custom firmware to make the LCD display do his bidding and we’re wondering what’s next?