Flings
Apps and tools built by our engineers that are intended to be played with and explored.

Virtual USB Analyzer

Virtual USB Analyzer

Summary

The Virtual USB Analyzer is a free and open source tool for visualizing logs of USB packets, from hardware or software USB sniffer tools. As far as we know, it is the world’s first tool to provide a graphical visualization along with raw hex dumps and high-level protocol analysis.

The Virtual USB Analyzer is not itself a USB sniffer tool. It is just a user interface for visualizing logs. It currently supports three log formats, but it is designed to be easily extensible. With a few dozen lines of Python code, you can add support for your favorite log format.

Features

  • Unique graphical timeline view
  • Side-by-side diff mode: visually compare two log files
  • Pluggable log format modules: VMware, Ellisys, usbmon
  • Pluggable protocol decoders: USB Chapter 9, Bluetooth, Storage, Cypress FX2
  • Packet metrics and filtering tools
  • Whole-bus analysis: analyze multiple devices concurrently
  • Written in Python, with a GTK+ user interface
  • Automatic “tail -f” mode: follow log files as they grow
  • Loads large log files in the background. You can start browsing before the whole file is loaded into memory
  • Automatic decompression of gzipped log files

System Requirements

To run the Virtual USB Analyzer, you must have Python and the PyGTK bindings. Additionally, to see the graphical timeline view, you will need gnome-canvas and its Python bindings.

If you have an Ubuntu 8.10 system, you don't need to install any additional packages to run the Virtual USB Analyzer.

Windows and Mac OS users: It should be possible to run the Virtual USB Analyzer on Windows or Mac OS systems if you have a port of PyGTK installed, however we've only tested vusb-analyzer on Linux. If you have patches or tips for running vusb-analyzer on other operating systems, we'd love to hear them.

Instructions

To use the Virtual USB Analyzer, you first need to capture a log of some USB protocol traffic. This tutorial will show you how to use the logging built in to VMware's virtual USB stack. You'll need either VMware WorkstationVMware Fusion, or the free VMware Player, as well as a virtual machine and USB device you want to capture data from.

Note that you can capture the log file using any host operating system, and your virtual machine can be running any operating system that supports USB. However, you will probably want to analyze the resulting logs on a Linux machine- the vusb-analyzer tool may be difficult to run on Windows or Mac OS. See the system requirements.

You can find the detailed tutorial here.

Video

Change Log

Engineers


M. Elizabeth Scott

Hypervisor

Scott Perry

Hypervisor
Add Comment

6 thoughts on “Virtual USB Analyzer

  1. Jim Schimpf

    Hi,
    Running on OS X (sort of) got PyGTK installed but unfortunately no gnome-canvas. I had to do the following patches in Types.py and View.py had try: import gnomecanvas/ except gnomecanvas: / Second exception since gnomecanvas wasn’t defined. Just removed the gnomecanvas from the except and she runs. Cannot get the timing diagram till I find a way to get gnomecanvas but it does partially work. (Oh yea I do have Ubuntu in a Fusion VM but hey gotta try the native version first.) Thanks for the very neat tool. I also had to make the changes mentioned Reineke for the time stamp changes.

    Reply
    1. Adam Thompson

      Yes, it’s a program… for Linux/UNIX, not for Windows. As the “System Requirements” page says, it may be possible to run it on Windows if you install Python and PyGTK yourself… and also learn how to run Python scripts under Windows. I don’t think it’s worth the effort unless you have a specific USB device driver problem you need to solve.

      Reply
  2. Aaron Clarke

    This has been a great tool for embedded USB host firmware development. I’ve been using it to see how the Linux stack handles devices. Works great with usbmon scripts too. I find that useful to analyze a hub directly without seeing VMware’s virtual hub.

    Thanks,

    Aaron

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>