I'd tried some first steps using nRF Sniffer on a linux host.
Within sniffer_uart_protocol.xlsx I read something about the Uart packet format et cetera.
I'd programmed my PCA10000 V2.2.0 with the current sniffer version 0.9.7 while succesfully trying out nRF Sniffer on a Windows host machine.
When I plug the PCA10000 to my linux machine, I'd expected a new /dev/ttyUSBx but it isn't. Using lsusb
, I just see a new usb device: Bus 002 Device 012: ID 1366:0105 SEGGER
. And in /dev
, I see a ttyACM3
.
- Did anybody know if the
/dev/ttyACMx
is related to the nRF Sniffer uart interface? - And what about the connection parameters?
- Baudrate?
- Rts / Cts hardware handshake?
I'd performed some tests with 38.400 bd and 115.200 bd. On my /dev/ttyACM3
I see lots of incoming data, but never the pattern 0xBE 0xEF
as described in sniffer_uart_protocol.xlsx.