Skip to main content

Mavsniff enables you to capture and replay MAVLink communication over serial line or network

Project description

mavsniff

Capture and replay MAVLink packets from your drone or GCS.

You can read from a serial line (ttyS0/COMx) or from network (TCP). Mavsniff stores packets in pcapng format so you can analyse them with Wireshark.

Instalation

$ pip install mavsniff

Mavsniff is distributed via PYPI and an entrypoint mavsniff should be available in your $PATH after installation.

Usage

$ mavsniff capture --device /dev/ttyS0 --file recording.pcapng
$ mavsniff replay --file recording.pcapng --device socket://localhost:5467 

Available device urls:

  • -d /dev/ttyS0 - standard serial port on UNIX systems
  • -d COMx - e.g. COM1 or COM4 - standard serial ports on Windows systems
  • -d socket://<host>:<port> - receive packets via TCP (only for capture command)
  • currently, there is no option how to send MAVLink packets over the network.

Consult more device urls on pyserial documenation page.

Caviats

When using a loop:// device please note that there is a finite buffer size (usually 4096 bytes). Do not send larger files there withou reading from the buffer in parallel.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mavsniff-0.0.3.tar.gz (7.6 kB view hashes)

Uploaded Source

Built Distribution

mavsniff-0.0.3-py3-none-any.whl (8.7 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page