From 8455c8e585cec53d80b0a9a25c1930a93f067a48 Mon Sep 17 00:00:00 2001 From: Yuri D'Elia Date: Tue, 22 Jun 2021 17:56:42 +0200 Subject: [PATCH] tools: Add/fix documentation --- tools/README.md | 4 ++++ tools/elf_mem_map | 2 +- 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/tools/README.md b/tools/README.md index e7911501..30648d0d 100644 --- a/tools/README.md +++ b/tools/README.md @@ -25,6 +25,10 @@ With ``--qdirstat`` and a single elf file, generate a [qdirstat](https://github. This assumes the running firmware generating the dump and the elf file are the same. Requires Python3 and the [pyelftools](https://github.com/eliben/pyelftools) module. +### ``dump2bin`` + +Parse and decode a memory dump obtained from the D2/D21/D23 g-code into readable metadata and binary. The output binary is padded and extended to fit the original address range. + ### ``update_eeprom`` Given one EEPROM dump, convert the dump to update instructions that can be sent to a printer. diff --git a/tools/elf_mem_map b/tools/elf_mem_map index cb6e423c..df3fc0f5 100755 --- a/tools/elf_mem_map +++ b/tools/elf_mem_map @@ -344,7 +344,7 @@ def main(): ap = argparse.ArgumentParser(description=""" Generate a symbol table map starting directly from an ELF firmware with DWARF3 debugging information. - When used along with a memory dump obtained from the D2 g-code, + When used along with a memory dump obtained from the D2/D21/D23 g-code, show the value of each symbol which is within the address range. """) ap.add_argument('elf', help='ELF file containing DWARF debugging information')