Your Universal Remote Control Center
URC's Consumer Remotes Forum - View Post
Previous section Next section Previous page Next page Up level
Up level
The following page was printed from


Page 2 of 2
Copying menu screens from one device to another
This thread has 19 replies. Displaying posts 16 through 20.
OP | Post 16 made on Thursday November 9, 2000 at 02:00
Historic Forum Post

Although I didn't look deep into it, I believe the PDT is a Intel Hex format file. This would be a normal way to feed a processor's flash. I think (but should investicate)it is just the same data as the corresponding mdl.
I think in the remote are some more tables (including the actual program code).
Of course we should be able to extract them. The boot loader (which is ofcourse write protected, if they developed the remote correct) is probable able to extract all memory from remote. We must have a look at the initial serial communication.

adding page5: Hmm, this is probably not possible, I believe to many variables are involved. One example, the default button assignment is probably (grid position + pagenumber * 40 ).

Moving time, date etc.: This should be possible I think

Sharing info: Always interested.

Greetings Rene

OP | Post 17 made on Thursday November 9, 2000 at 11:03
Jason S
Historic Forum Post
CArrayToIntelHex??? ;-)

I'll send you the Excel spreadsheet I've been working on that tries to document the table fields.

I was able to move the time and date info, but again, not able to test uploading it to the remote.

If the boot loader is write protected (I hope it is), then we may be able to modify quite a bit without worry of trouncing the boot loader code. I was looking at ORDesktop and an interface like that would be very nice for this remote.
OP | Post 18 made on Thursday November 9, 2000 at 15:09
Historic Forum Post
The *.pdt (where * is same name as a mdl file is indeed
an intel hex file.
If converted to a binary, its 64 Kb (nice number).
It looks like the program for the remote.
(all system screen texts are in it)

The bootloader must be protected, if not any upload
failure would force people to send the remote back.

Well after disassembling the code, we should find out :-)

So what processor is in it?
Anyone knows what processor has a 0x8D jmp instruction?
OP | Post 19 made on Thursday November 9, 2000 at 15:39
Daniel Tonks
Historic Forum Post
Just a little notation, there's a special button hidden in the battery compartment that, when batteries are removed, deletes the loaded program. When that happens the remote boots up, does several system checks then complains it has no program and provides instructions on downloading. So, it seems to be fairly safe.
OP | Post 20 made on Thursday November 9, 2000 at 22:42
Historic Forum Post
0x8D is a JSR on the 6800...don't know if that's the right one...
Page 2 of 2

Jump to

Protected Feature Before you can reply to a message...
You must first register for a Remote Central user account - it's fast and free! Or, if you already have an account, please login now.

Please read the following: Unsolicited commercial advertisements are absolutely not permitted on this forum. Other private buy & sell messages should be posted to our Marketplace. For information on how to advertise your service or product click here. Remote Central reserves the right to remove or modify any post that is deemed inappropriate.

Hosting Services by ipHouse