Reverse Engineering & Development tools for the Nordic nrf51822 arm chip
- nrf51822
- jumper wires
- swd debugger (Flipper0)
.88888888:.
88888888.88888.
.8888888888888888.
888888888888888888
88' _`88'_ `88888
88 88 88 88 88888
88_88_::_88_:88888
88:::,::,:::::8888
# This script template was copied from https://gist.github.com/ErezBinyamin/132c576b132f397ae63f7059d72ff5c9
# Save this script as some unique SCRIPTNAME.sh
# For starters rename the 'SCRIPTNAME' variable: `sed -i s/SCRIPTNAME/desiredname/g`
SCRIPTNAME() {
# Argparsing envars and positional arguments into meaningfully named local variables. Don't do optargs in bash scripts
local ENVAR=${ENVAR:-defaultValueString}
local ARG1=${1:-7}