It wasn't until I downloaded nRF-Sniffer-v2 that I discover the release note below that explicitly states that nrf_sniffer now supports all platforms supported by Wireshark (Windows, Linux, OSX). By this time I had already set-up a windows VM, installed python, pyserial, wireshark!
Please can you expose information like this at a higher level - like on the page where the code can be downloaded. I know it's obvious to you guys, but we are not exposed to the same level of general knowledge.
Version 2.0.0-b1:
Summary:
This release replaces the old nRF Sniffer.exe control window used for sending
commands to the sniffer hardware. This functionality is now moved to Wireshark.
As a result of this, nrf_sniffer now supports all platforms supported by
Wireshark (Windows, Linux, OSX).
The supported segger jlink verrsion is now bundled with the release so it is easier
to find the correct version.
The supported hardware has also been updated to PCA10028, PCA10031 and PCA10040.
Note that PCA10040 uses nRF52 while the others uses nRF51.
Deprecated features:
- nRF_Sniffer.exe application (replaced with support in Wireshark)
New features:
- Support for nRF52 (PCA10040).
- Support for 2mbit mode (PCA10040 only, Requires Wireshark version 2.4.2 or newer).
- Support for the new channel map alogorithm in a connection (nRF51 and nRF52 )
Known issues:
- Several lost packets is reported when starting the sniffer.