serial port / UART sniffer, not only logger
reading,
http://com0com.sourceforge.net/
https://github.com/paulakg4/com0com
open source, com0com-3.0.0.0-i386-and-x64-signed.zip, https://sourceforge.net/projects/com0com/files/latest/download
commercial, https://www.virtual-serial-port.org/
software and hardware setup, aka so-ha-ware, sohawre
- install com0com-3.0.0.0-i386-and-x64-signed.zip
- setup com0com0
- create a pair virtual com8 and com9, uses port Class only
- SerialSniffer, build this C# software by visual studio, https://github.com/xiaolaba/SerialSniffer
- check arduino connect comport, mine is com14, edit the a.bat with this com14
- burn the arduino code test_python_crlf.ino
- build hostware python code, test_python_crlf, this is a version of source code and devirved from https://github.com/xiaolaba/Curve_Tracer_testing/
- goto SerialSniffer & exe build folder, mine is SerialSniffer-master\SerialSniffer\bin\Debug
- create a.bat in exe build folder, or input with your command prompt
SerialSniffer -rx COM8 -tx COM14 -baud 1000000 -output sniffed.txt
- run a.bat, will open SerialSniffer
- goto folder test_python_crlf, run_py.bat, will open hostware for testing, select com9, click RUN
- look at the serial port and screen output, something like this
- job done, Serialsniffer is working flawnessly
previously used UART sniffer/logger has bug but commercial product of which no fix yet.
reading, reference,
https://moon-half.info/p/3491
https://cloud.tencent.com/developer/article/1030914
did not work http://www.sudt.com/cn/stax/download.htm