m1n1/proxyclient/experiments/memdump.py
Hector Martin d9561b7507 proxyclient: Big cleanup/move to module
All the common/importable stuff now lives in the 'm1n1' module.

General use tools are in tools/

Reverse engineering experiments are in experiments/

Signed-off-by: Hector Martin <marcan@marcan.st>
2021-06-10 19:40:48 +09:00

22 lines
436 B
Python
Executable file

#!/usr/bin/env python3
# SPDX-License-Identifier: MIT
import sys, pathlib
sys.path.append(str(pathlib.Path(__file__).resolve().parents[1]))
from m1n1.setup import *
p = 0x800000000
limit = u.base
block = 0x40000
while p < limit:
f = "mem/0x%x.bin" % p
if os.path.exists(f):
p += block
continue
print("dumping 0x%x..." % p)
data = iface.readmem(p, block)
open(f, "wb").write(data)
p += block