can-explorer
is a CAN bus visualization tool designed to aid in reverse engineering.
By continuously plotting all payloads for each CAN id, spotting trends that correspond to a specific action can become signicantly easier to identify.
Please refer to this prior article I wrote for a working example of how this approach can be used to find which id includes speedometer data.
pipx is recommended although any package manager that supports pyproject.toml
files can be used.
pipx install can-explorer
The gui can be launched by running one of the below commands from a terminal.
can-explorer
python3 -m can_explorer
Before starting the viewer, you must navigate to the settings tab and input your interface adapter configuration to create a bus instance. Please refer to the python-can docs for more information regarding the various interfaces supported.
The gui can also be launched with a demo flag which will auto select the virtual interface option and start streaming simulated CAN data in a background process.
can-explorer --demo
Reach out to the maintainer at one of the following places:
- GitHub issues
- Contact options listed on this GitHub profile
If you want to say thank you or/and support active development of can-explorer consider adding a GitHub Star to the project.
Please read our contribution guidelines
For a full list of all authors and contributors, see the contributors page.
This project is licensed under the GNU General Public License v3.
See LICENSE for more information.