Brighton's Blog
← All Series

STM32

2 - Reverse Engineering the TI EV2300: Building the Firmware Clone

Reverse EngineeringSTM32USBHIDI2CSMBusTIEV2300FirmwareEmbedded

“started from the bottom now we’re here” — Drake

From Python Driver to Firmware Clone

In Part 1 I reverse engineered the EV2300’s HID protocol and built a pure-Python driver that talks to the real adapter without TI’s DLLs. That solved the “no scripting interface” problem—but we still needed the physical EV2300 hardware. At $200 a pop, with a supply chain that’s been spotty since 2020, that’s not great for a university lab with 30 students.

Read more →

3 - Reverse Engineering the TI EV2300: The DLL Battle

Reverse EngineeringGhidraSTM32USBHIDTIEV2300DLLCRCFirmware

“I’ve been through the desert on a horse with no name” — America

The Timeout That Wouldn’t Die

After Part 2 I had bqStudio reading registers through the STM32 bridge. The silent command fixes got the GUI working. But the DLL path—bq80xrw.dll’s ReadSMBusWord—still returned “EV2X00 Adapter USB Timeout” every single time.

Read more →