Copyright (C) 2012 Alejandro Mery amery@geeks.cl
Tools to help hacking Allwinner A10 (aka sun4i) based devices and possibly it's successors, that's why the 'x' in the package name.
.fex
file (de)compiler
Usage: ./sunxi-fexc [-vq] [-I <infmt>] [-O <outfmt>] [<input> [<output>]]
infmt: fex, bin (default:fex)
outfmt: fex, bin (default:bin)
compatibility shortcut to call sunxi-fexc
to decompile a script.bin
blob back into .fex
format used by Allwinner's SDK to configure
the boards.
compatiblity shortcut to call sunxi-fexc
to compile a .fex
file
into the binary form used by the legacy 3.4 kernel ("linux‑sunxi").
script interface for talking to the FEL USB handler built in to the CPU. You activate FEL mode by pushing the uboot / recovery button at poweron. See http://linux-sunxi.org/FEL/USBBoot for a detailed usage guide.
Simple wrapper (script) around fel-pio
and sunxi-fel
to allow GPIO manipulations via FEL
ARM native sdcard bootloader forcing the device into FEL mode
ARM native helper (binary) for fel-gpio
Manipulate PIO register dumps
Tool for manipulating Allwinner NAND partition tables
ARM native boot helper to force the SD port into JTAG and then stop, to ease debugging of bootloaders.
Dump information from Allwinner boot files (boot0 / boot1)
--type=sd include SD boot info
--type=nand include NAND boot info (not implemented)
gives information about a phoenix image created by the phoenixcard utility and optionally extracts the embedded boot code & firmware file from their hidden partitions.
Tool for reading DRAM settings from registers. Compiled as a static binary for use on android and other OSes. To build this, get a toolchain and run:
make CROSS_COMPILE=arm-linux-gnueabihf- sunxi-meminfo
A simple tool, which can be executed on a rooted Android device to dump the script.bin blob from RAM via reading /dev/mem. To build this, get a toolchain and run:
make CROSS_COMPILE=arm-linux-gnueabihf- sunxi-script_extractor
This software is licensed under the terms of GPLv2+ as defined by the Free Software Foundation, details can be read in the COPYING file.