Reverse Engineering the Propel ExecuHeli IR Protocol
Here’s a reverse engineering project that is instructive re: how to parse out several channels of IR commands issued to control an indoor helicopter.
From PetaVolt, via Hack A Day:
After seeing all of the Syma 107′s hacked I thought I would try to decode the IR protocol on my Propel ExecuHeli. Here are my findings.
For accuracy purposes I decided to find the signal on the controller board. I traced the IR LEDs through a transistor to pin 6 of the micro.
Unfortunately, there are no markings of any kind on the micro. It looks like it was manufactured without them.
Before digging into the protocol I thought I would have a look at what frequency the data is modulated at for the three different channels….
Join 6,000+ makers on Adafruit’s Discord channels and be part of the community! http://adafru.it/discord
CircuitPython in 2018 – Python on Microcontrollers is here!
Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts.
Join us every Wednesday night at 8pm ET for Ask an Engineer!
Follow Adafruit on Instagram for top secret new products, behinds the scenes and more https://www.instagram.com/adafruit/
Maker Business — Aquarium troubles: the cost of iteration and troubleshooting with a manufacturers abroad
Wearables — Plastic gem know-how
Electronics — Counting Pin Numbers
Biohacking — Exploring Our Inner Reality : Entopic Visions
Python for Microcontrollers — CircuitPython 3.0.0 Release Candidate 0 released!
Get the only spam-free daily newsletter about wearables, running a "maker business", electronic tips and more! Subscribe at AdafruitDaily.com
No comments yet.
Sorry, the comment form is closed at this time.