No description
Find a file
2020-10-12 20:33:10 +02:00
img Upload New File 2020-10-09 21:15:47 +02:00
TapFiles Revert "Delete Tap_1.hex" 2020-10-08 15:24:03 +02:00
CheckPoint.MD Add new file 2020-10-08 15:13:16 +02:00
CommandSet.MD Update CommandSet.MD 2020-10-12 00:45:44 +02:00
LED.MD Revert "rename file" 2020-10-09 21:09:13 +02:00
ReadKeys.MD Update ReadKeys.MD 2020-10-12 20:33:10 +02:00
README.md Update README.md 2020-10-09 21:18:55 +02:00

EZIO-G500

On Checkpoint 4x00 series, there is a graphics LCD display with some arrow keys and 3 LEDs.

I wasn't able to find many information for this specific modules around the web.

Close Up Device

So I've decided to tap and record the communication between the Checkpoint and the module for further decoding.

Tapping 4400

Here is my journey trought this reverse engineering.

Close view of tapping

Open communication Port with 115200 bps, 8N1 settings and write Commands. you may want to read return the keys.

obviously Checkpoint has use graphics always; they upload images on every update.