New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reverse the process and generate an rf tx. #2904
Comments
Likely you need to analyze the cu8 and copy or reproduce that. |
but say I have a rtl_433 result from a known rtl_433 device, how to reverse that into a cu8 file. |
You can reassemble data you got from a known device along with the description of the protocol into a cu8 file using https://github.com/triq-org/tx_tools/ You need to write a spec like this https://github.com/triq-org/tx_tools/blob/master/examples/pmv107j.txt |
Hey @zuckschwerdt, just wondering how do I get the code: I can record a cu8 file but not sure how to convert it to this code. |
That's the content of the bitbuffer, the raw data you get from rtl_433. E.g.
The |
so I'm getting:
Given that does it mean my file would look something like this:
? Thanks @zuckschwerdt |
That's a EV1527 code, common with buttons, doorbells, PIRs and such. A very simple 25 bit OOK code. |
I have the hackRF I currently use 2 antenas, 1 for receiving and one for sending. Just wondering would it be possible to share hackrf lets say |
Look at the .ook files, it's just on and off times. It can be cleaned up to nominal times if needed. Note that the code you wrote above is for FSK, a OOK code would be like this (adjust the timings as needed):
|
I have a bunch of relays I have switches for, but I'd also like to emulate what the switches do. if I get a json from rtl_433, is it possible to get the rf tx code in reverse so I can play it on my hack rf one or flipper zero.
The text was updated successfully, but these errors were encountered: