Attend XDA's Second Annual Developer Conference, XDA:DevCon 2014!
5,805,777 Members 41,723 Now Online
XDA Developers Android and Mobile Development Forum

[FINISHED & WORKING]TX with working screens users wanted!

Tip us?
 
updateing
Old
(Last edited by updateing; 12th January 2014 at 11:50 AM.)
#1  
Senior Member - OP
Thanks Meter 166
Posts: 176
Join Date: Aug 2012
Location: Wuhan

 
DONATE TO ME
Default [FINISHED & WORKING]TX with working screens users wanted!

I have gathered the data and my phone is normal now.Thanks for participation!
And here is the data for MDW30_id_1e,which is Touch Firmware ver.C,provided by Sakilia @ Angeeks.Thank you!

The recovery method is posted here: http://forum.xda-developers.com/show...php?p=49297118

Due to the limitation of MAX RETURN PACKET SIZE=10,some data is NOT complete but it's easy to find the missing parts.
You can use the data to compare and create your own register recovery method.There are so many clues/hints in its driver

SPOILER:

 
GEN_READ
reg=0xE6
len=10
data[0]=0x12
data[1]=0x56
data[2]=0x81
data[3]=0x72
data[4]=0x1E
data[5]=0x01
data[6]=0x00
data[7]=0x00
data[8]=0x54
data[9]=0x33
GEN_READ
reg=0xE7
len=10
data[0]=0x02
data[1]=0x02
data[2]=0x0D
data[3]=0x36
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0xCE
data[9]=0x9A
GEN_READ
reg=0xDE
len=10
data[0]=0x10
data[1]=0x80
data[2]=0x11
data[3]=0x0B
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x9E
data[9]=0xA0
GEN_READ
reg=0xBF
len=10
data[0]=0x01
data[1]=0x22
data[2]=0x33
data[3]=0x06
data[4]=0xB0
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0xA2
data[9]=0x38
GEN_READ
reg=0xE4
len=10
data[0]=0x00
data[1]=0x00
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x8C
data[9]=0x7C
GEN_READ
reg=0xE1
len=10
data[0]=0x00
data[1]=0x00
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x8C
data[9]=0x7C
GEN_READ
reg=0xB2
len=10
data[0]=0x00
data[1]=0x00
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x8C
data[9]=0x7C
GEN_READ
reg=0xB4
len=10
data[0]=0x02
data[1]=0x00
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0xE3
data[9]=0x77
GEN_READ
reg=0xB6
len=10
data[0]=0x51
data[1]=0xE3
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x4C
data[9]=0x49
GEN_READ
reg=0xC0
len=10
data[0]=0x40
data[1]=0x02
data[2]=0x7F
data[3]=0xC8
data[4]=0x08
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0xC1
data[9]=0x22
GEN_READ
reg=0xC1
len=10
data[0]=0x00
data[1]=0xA8
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x9D
data[8]=0x92
data[9]=0x08
GEN_READ
reg=0xC2
len=10
data[0]=0x00
data[1]=0x00
data[2]=0x09
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0xFF
data[9]=0x59
GEN_READ
reg=0xC3
len=10
data[0]=0x04
data[1]=0x00
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x52
data[9]=0x6A
GEN_READ
reg=0xC4
len=10
data[0]=0x4D
data[1]=0x83
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0xD3
data[9]=0x8D
GEN_READ
reg=0xC6
len=10
data[0]=0x12
data[1]=0x00
data[2]=0x08
data[3]=0x71
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x80
data[8]=0x7C
data[9]=0x97
GEN_READ
reg=0xC7
len=10
data[0]=0x22
data[1]=0x00
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x13
data[9]=0xC1
GEN_READ
reg=0xC8
len=10
data[0]=0x4C
data[1]=0x0C
data[2]=0x0C
data[3]=0x0C
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x41
data[9]=0xD5
GEN_READ
reg=0xC9
len=10
data[0]=0x00
data[1]=0x00
data[2]=0x00
data[3]=0x16
data[4]=0x32
data[5]=0x2E
data[6]=0x3A
data[7]=0x43
data[8]=0xBD
data[9]=0xAE
GEN_READ
reg=0xCA
len=10
data[0]=0x00
data[1]=0x12
data[2]=0x22
data[3]=0x26
data[4]=0x21
data[5]=0x1C
data[6]=0x25
data[7]=0x31
data[8]=0x9E
data[9]=0xE6
GEN_READ
reg=0xCB
len=10
data[0]=0x00
data[1]=0x0C
data[2]=0x20
data[3]=0x3A
data[4]=0x42
data[5]=0x40
data[6]=0x47
data[7]=0x4B
data[8]=0x01
data[9]=0x0E
GEN_READ
reg=0xCC
len=10
data[0]=0x00
data[1]=0x0D
data[2]=0x21
data[3]=0x24
data[4]=0x1D
data[5]=0x14
data[6]=0x18
data[7]=0x1F
data[8]=0xF4
data[9]=0x83
GEN_READ
reg=0xCD
len=10
data[0]=0x23
data[1]=0x39
data[2]=0x5A
data[3]=0x5F
data[4]=0x57
data[5]=0x4C
data[6]=0x51
data[7]=0x51
data[8]=0xEF
data[9]=0x09
GEN_READ
reg=0xCE
len=10
data[0]=0x00
data[1]=0x0C
data[2]=0x1C
data[3]=0x23
data[4]=0x1A
data[5]=0x0E
data[6]=0x0E
data[7]=0x13
data[8]=0x11
data[9]=0x74
GEN_READ
reg=0xD0
len=10
data[0]=0x6A
data[1]=0x64
data[2]=0x01
data[3]=0x18
data[4]=0xA1
data[5]=0x00
data[6]=0x21
data[7]=0x00
data[8]=0x8B
data[9]=0x2C
GEN_READ
reg=0xD1
len=10
data[0]=0x77
data[1]=0xD4
data[2]=0x5C
data[3]=0x21
data[4]=0x97
data[5]=0x06
data[6]=0x00
data[7]=0x00
data[8]=0x28
data[9]=0x86
GEN_READ
reg=0xD3
len=10
data[0]=0x33
data[1]=0x00
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0xD4
data[9]=0x1B
GEN_READ
reg=0xD5
len=10
data[0]=0x0C
data[1]=0x0C
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x74
data[9]=0xF6
GEN_READ
reg=0xD7
len=10
data[0]=0x22
data[1]=0x21
data[2]=0x55
data[3]=0x46
data[4]=0x44
data[5]=0x34
data[6]=0x02
data[7]=0x65
data[8]=0x96
data[9]=0x15
GEN_READ
reg=0xD8
len=10
data[0]=0x34
data[1]=0x64
data[2]=0x23
data[3]=0x25
data[4]=0x62
data[5]=0x32
data[6]=0x00
data[7]=0x00
data[8]=0x75
data[9]=0x10
GEN_READ
reg=0xD9
len=10
data[0]=0xDF
data[1]=0xDD
data[2]=0x3F
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x91
data[9]=0x18
GEN_READ
reg=0xDA
len=10
data[0]=0x01
data[1]=0x00
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x33
data[9]=0xFD
GEN_READ
reg=0xDB
len=10
data[0]=0x46
data[1]=0x62
data[2]=0x42
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x75
data[9]=0x9D
GEN_READ
reg=0xDE
len=10
data[0]=0x10
data[1]=0x80
data[2]=0x11
data[3]=0x0B
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x9E
data[9]=0xA0
GEN_READ
reg=0xE2
len=10
data[0]=0x01
data[1]=0x00
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x33
data[9]=0xFD
GEN_READ
reg=0xF3
len=10
data[0]=0x00
data[1]=0x00
data[2]=0x00
data[3]=0x25
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x49
data[9]=0x3A
GEN_READ
reg=0xFD
len=10
data[0]=0x04
data[1]=0x55
data[2]=0x53
data[3]=0x00
data[4]=0x70
data[5]=0xFF
data[6]=0x10
data[7]=0x73
data[8]=0x19
data[9]=0xEC
GEN_READ
reg=0xE5
len=10
data[0]=0x01
data[1]=0x00
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x33
data[9]=0xFD
GEN_READ
reg=0xE6
len=10
data[0]=0x12
data[1]=0x56
data[2]=0x81
data[3]=0x72
data[4]=0x1E
data[5]=0x01
data[6]=0x00
data[7]=0x00
data[8]=0x54
data[9]=0x33
GEN_READ
reg=0xFE
len=10
data[0]=0x00
data[1]=0x00
data[2]=0x00
data[3]=0x00
data[4]=0x00
data[5]=0x00
data[6]=0x00
data[7]=0x00
data[8]=0x8C
data[9]=0x7C


================================================== =======
Just like what I said in previous post about inverted screen on TX,we can collect the correct register data from normal TX's Touch Firmware version C screen and write it back to the problem ones.Now I have come up with an easy way to collect the data.

If you are a TX owner and your phone's screen works normally,not inverted even in stock firmware,you are the one we are looking for!
(Touchscreen firmware version C is recommended.But if you get a B,post it anyway and mention that it's a B one )

Quote:
1.Extract the attacted zip to /data
2.In Root Explorer(or anything else similar)grant /data/readnvm_new.sh with executing permissions(chmod 755)
3.Run this script.Just click it in Root Explorer and "Execute" will do.Adb shell+su is also ok.The screen will flicker sightly for ~3sec.
4.After it finishes,post /sdcard/nvm.txt here.
Thanks in advance!

Some minor problems:the panel only return 10bytes at most.But the data written in NVM_RECOVER is 13bytes at most,which means there are 3bytes of correct data can't be read.I will try writing the first 10bytes.If that doesn't work,let's come up with something else...
Attached Files
File Type: zip readnvm_new.sh.zip - [Click for QR Code] (358 Bytes, 74 views)
The Following 3 Users Say Thank You to updateing For This Useful Post: [ Click to Expand ]
 
updateing
Old
#2  
Senior Member - OP
Thanks Meter 166
Posts: 176
Join Date: Aug 2012
Location: Wuhan

 
DONATE TO ME
Well I have collected the data I needed.Thanks for you downloaders!~
The Following 3 Users Say Thank You to updateing For This Useful Post: [ Click to Expand ]
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes