I think I will be able to utilise the ReadMemoryByAddress ($23) Service. From page 118 GMW3110
It is possible that some or all of the RAM addresses may be protected. I understand in that case I'll have to first unlock the TCM using the SecurityAccess ($27) Service and persist a tester present connection. Is the seed / key algo known for T43? I'd presume same as e38?The purpose of this service is to retrieve data from a contiguous range of ECU memory addresses.... The ReadMemoryByAddress service is only available as a one shot request-response service.... If any of the addresses (that fall in the range of the request message) have security restrictions then the request shall be rejected unless the tester had previously successfully accessed security.
Time for the part where I need help. I'm interested in reading ram address 0x003fc846. This post should have me sorted for the connection and I can fire my message from the VPW console. Is the format of the message as per the documentation? My message is as follows:
Code: Select all
Service => Memory Address => Memory Size
0x23 0x003fc846 0x0002
Message => 23003fc8460002
To summarise, with all other settings left as default:
Code: Select all
Settings => J2534 Device => MDI
=> Protocol => CAN
=> PCM => 7E2
VPW Console => 23003fc8460002