philpem · @philpem
519 followers · 2174 posts · Server digipres.club

And now, round two! This board has a GAL16V8 which decodes the dual RAM selects into a single select. Unfortunately I've cocked up, can you spot my mistake?

#reverseengineering #HackTV #BSBACM

Last updated 2 years ago

philpem · @philpem
519 followers · 2174 posts · Server digipres.club

This is what a half assembled RAM dumper looks like. Needs a 4-pin header, another seven Roadrunner wires, the GAL socket flipping 180 degrees, and a bit of GAL programming.

#HackTV #reverseengineering #BSBACM

Last updated 2 years ago

philpem · @philpem
519 followers · 2174 posts · Server digipres.club

I'm going to have a rethink about the RAM dump attempt. I've found a pair of Harwin transition headers, and I think I can use them and some IDC cable to connect to the ROM socket.
With a bit of luck, pad board with Roadrunner wire should have better SI than Veroboard, and I can make up a "sniffer" to read out the RAM - or at least the bits which are being accessed.

#reverseengineering #BSBACM

Last updated 2 years ago

philpem · @philpem
519 followers · 2174 posts · Server digipres.club

I'm surprised nobody has commented on how my HP16700 config for sniffing the RAM and host bus is called "kitchen sink".

#BSBACM

Last updated 2 years ago

philpem · @philpem
519 followers · 2174 posts · Server digipres.club

More analysis on the battery-backup circuit!
BB_VCC powers a Mostek MK48H64UN SRAM - it's 3V less CR2's voltage drop with no VCC, or 5V less about 0.2V with VCC present.

Q1 is there because the MK48H64 can draw up to 100mA when active. A 1N4148 diode would drop over a volt in those conditions.
But Q1 is driven into saturation with 2.5mA base current, so according to fig.4 of the 2N2907 datasheet (global.oup.com/us/companion.we), BB_VCC would be around 4.85V with a 100mA load.

#BSBACM

Last updated 2 years ago

philpem · @philpem
519 followers · 2174 posts · Server digipres.club

Look, what's this? A shiny new schematic, with corrected chip selects!
Shame the battery back-up circuit still doesn't make much sense. AS_P1 and AS_P25 go to the ASIC. But I'm still puzzled why Q1 is there, when CR1 bypasses it?
AS_P25 low would make Q1 bypass CR1, but the Vce(sat) of Q1 is higher than the Vf of CR1, so it's doing... nothing?

#HackTV #reverseengineering #BSBACM

Last updated 2 years ago

philpem · @philpem
519 followers · 2174 posts · Server digipres.club

Continuing with the project tonight, for . ICYMI, the previous thread is here: digipres.club/@philpem/1097344

#HackTV #reverseengineering #BSBACM

Last updated 2 years ago

philpem · @philpem
519 followers · 2174 posts · Server digipres.club

Perhaps unsurprisingly this didn't work too well

#BSBACM

Last updated 2 years ago

philpem · @philpem
519 followers · 2174 posts · Server digipres.club

First logic analyser capture. .
What we've learned here is, the RAM Output Enable isn't qualified with the address decode. I'll have to take a closer look at that, it may be an inverted version of the 6502 R/!W, possibly gated with phi2.

#BSBACM

Last updated 2 years ago

philpem · @philpem
519 followers · 2174 posts · Server digipres.club

Unleash the Kraken

#BSBACM

Last updated 2 years ago

philpem · @philpem
519 followers · 2174 posts · Server digipres.club

Seeing as @captainjack asked so nicely I'm going to show y'all how we do a live RAM dump on a 6502-based computer module: specifically the BSB Eurocypher Access Control Module (ACM).

There are two known ROM versions: V1.20 and V1.50. Software upgrading/patching seems to be a thing too, as V1.20 units I've seem claim to be "V1.20 V1.50".

The first photo is the ACM, the second is the diagnostic screen.

#HackTV #bsb #BSBACM

Last updated 2 years ago