Its going to be free and open source (albeit the source has not been released yet, but its written mostly in Java as far as I can tell, so even if they didnt end up releasing the source code, I'm sure some enterprising people would just decompile it)
Its roughly equivalent to IDA Pro + Hexrays and both disassembles and decompiles.
I've been reverse engineering some NXP MCU firmware with it for a few days, and it seems very powerful.
It lacks a debugger connection, which would be very useful, but apart from that it seems really good.
In order to make the most of the disassembly you need a PSPEC file for the exact processor you are using. So I made the attached PSPEC file for the NXP MK22 by processing their PDF reference doc (it took a lot of processing !)
I'm sure the same thing can be done for the STM32 or other MCU's either from the reference manuals, or possibly by using the C Preprocessor to generate something useful (though think using the reference doc route may be better)
Also, another trick I found, is that if you can halt the code in GDB, and dump the MCU ram to a file, you can load that file into the project (Press ALT+I)
You can then jump from the disassembly references to what has actually been in the RAM for specific pointers (variables)
There is a security advisory on the support/launch.sh and support/launch.bat
Line 150 of launch.sh needs to be changed so only localhost access is allowed
Code: Select all
And the same on line 140 of launch.bat for PC users
Code: Select all
set VMARG_LIST=!VMARG_LIST! -Xrunjdwp:transport=dt_socket,server=y,suspend=!SUSPEND!,address=localhost:!DEBUG_PORT!