Sniffring is a command line debugging tool that latches onto a user-specified transport ring and reads every message on that ring. It prints to screen the logo, sequence # and length of the message, followed by the message itself (except for binary waveform messages).
Usage 1: sniffring <ringname>
Usage 2: sniffring <ringname> <instid> <mod> <type>
Example Output:
>sniffring WAVE_RING
1163352566 Received <inst: 4> <mod:100> <type: 3> <seq:
89> <Length: 16>
1163352566 3400
1163352577 Received <inst: 4> <mod:132> <type: 3> <seq:
57> <Length: 16>
1163352577 5404
1163352579 Received <inst:
4> <mod:100> <type: 19> <seq: 47> <Length: 2064>
1163352581 Received <inst: 4> <mod:100> <type: 19> <seq:
48> <Length: 2064>
1163352581 Received <inst: 4> <mod:100> <type: 19> <seq:
49> <Length: 2064>
1163352584 Received <inst: 4> <mod:100> <type: 19> <seq:
50> <Length: 2064>
1163352586 Received <inst: 4> <mod:100> <type: 19> <seq:
51> <Length: 2064>
1163352586 Received <inst: 4> <mod:100> <type: 19> <seq:
52> <Length: 2064>
1163352587 Received <inst: 59> <mod: 50> <type: 19> <seq:134>
<Length: 86>
1163352587 Received <inst: 59> <mod: 50> <type: 19> <seq:135>
<Length: 86>
1163352587 Received <inst: 59> <mod: 50> <type: 19> <seq:136>
<Length: 86>
1163352588 Received <inst: 59> <mod: 50> <type: 19> <seq:137>
<Length: 86>
1163352588 Received <inst: 59> <mod: 50> <type: 19> <seq:138>
<Length: 86>
1163352588 Received <inst: 59> <mod: 50> <type: 19> <seq:139>
<Length: 86>
1163352588 Received <inst: 59> <mod: 50> <type: 19> <seq:140>
<Length: 86>
1163352588 Received <inst: 59> <mod: 50> <type: 19> <seq:141>
<Length: 86>
1163352588 Received <inst: 4> <mod:129> <type: 3> <seq:154>
<Length: 15>
1163352588 324
1163352588 Received <inst:
4> <mod:134> <type: 3> <seq:254> <Length: 13>
1163352588 0
1163352588 Received <inst:
4> <mod: 18> <type: 3> <seq:254> <Length: 11>
1163352588
1163352589 Received <inst: 4> <mod:100> <type: 19> <seq: 53> <Length: 2064>
Sniffring was developed by Lynn Dietz at USGS, Menlo Park.