Page History
...
Edit the _acceptFrame method in the above script to dump out received data
Rogue GUI Spy mode
It is sometimes useful to look at a rogue device's registers while the DAQ is running. When the DAQ instantiates the device's Root class, some lines are printed that indicate that a zmqserver has been started on a port range. Running a command like the following on the node hosting the device brings up a devGui-like interface:
- python -m pyrogue gui --server='localhost:9103'
JTAG Programming the FEB Camlink Converter
...
Overview
Content Tools