Skip to main content

Mavsniff enables you to listen/write mavlink communication on a serial line or USB

Project description

mavsniff

Capture and replay MAVLink packets from your drone or GCS.

You can read from a serial line (ttyS0/COMx) or from network (UDP/TCP). Mavsniff stores packets in pcapng format so you can analyse them with Wireshark.

Instalation

$ pip install mavsniff

Mavsniff is distributed via PYPI and an entrypoint mavsniff should be available in your $PATH after installation.

Usage

$ mavsniff capture --device /dev/ttyS0 --file recording.pcapng
$ mavsniff replay --file recording.pcapng --device udpout://localhost:5467 

Example of available devices:

  • -d /dev/ttyS0 - standard serial port on UNIX systems
  • -d COMx - e.g. COM1 or COM4 - standard serial ports on Windows systems
  • -d udpin://<host>:<port> - receive packets via UDP (only for capture command)
  • -d udpout://<host>:<port> - send packets via UDP (only for replay command)
  • -d loop:// - for local testing (do not send more than 100 packets)

Consult more device schemas on pyserial documenation page.

Caviats

When using a loop:// device please note that there is a finite buffer size (usually 4096 bytes). Do not send larger files there withou reading from the buffer in parallel.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mavsniff-0.0.1.tar.gz (8.4 kB view hashes)

Uploaded Source

Built Distribution

mavsniff-0.0.1-py3-none-any.whl (10.0 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page