Based on the reverse engineering efforts outlines in the last logs, I developed a python utility similar to esptool - which I hence named rtltool.
The functionality is very rudimentary. It provides commands for reading, erasing, writing and verifying contents of the micro controllers flash via UART.
To obtain a complete flash dump of the FT10 smart watch, run
./rtltool.py read_flash 0x00800000 0x00800000 ft10-flash_dump.bin
This can then be verified with
./rtltool.py verify_flash 0x00800000 ft10-flash_dump.bin
Discussions
Become a Hackaday.io Member
Create an account to leave a comment. Already have an account? Log In.