Agilent PCIe Protocol Analyzer Reverse Engineering
Reverse engineering the N5305A/N5306A family of PCIe protocol analyzers and
their host software.
Repository contents
file for the Agilent PAD file format.
- pad-files: Sample PCIe capture files in Agilent PAD (Protocol
Analyzer Data) format.
converting Agilent PAD PCIe capture files to PCAP-NG. The PCAP-NG files
generated by the pad2pcapng tool can be dissected in Wireshark using the
PCIe dissector.
capture files. This tool is much slower than the
Rust version, and will not be developed further.
- wireshark: A Wireshark dissector that can parse PCAP-NG files
containing PCIe capture data.
Related projects
- Nox: A set of FOSS tools, utilities, and libraries for PCI-Express
analyzers.
License
Except where otherwise noted:
- All software in this repository is made available under the
GNU General Public License, version 3 or later.
- All copyrightable content that is not software (e.g., reverse engineering
notes, this README file, etc.) is licensed under the
Creative Commons Attribution-ShareAlike 4.0 International License.