USB Monitor Software. Tool for view, log and analyze usb traffic

Capture, Log, View and Analyze USB Traffic

USB
Spy
software - USB traffic monitor

USBSpy: USB monitor


Current Version: 2.3
Release Date: Jul 24, 2012
Operating System: Windows 7, Windows x64 Edition, Windows Vista, 2003 Server, XP and 2000
File Size: 2.61 MB
Price: Start from $79.00 per copy

What Is USB
Spy
?

USB­Spy lets you capture, display, record and analyze data that's transferred between any USB device connected to PC and applications. This makes it a great tool for debugging software, working on device driver or hardware development and provides a powerful platform for effective coding, testing and optimization.

One of the irresistible features of USB
Spy
is its capability to monitor USB device's activity without creating additional filters, devices, etc, which might damage the driver structure in the system: you get absolutely transparent monitoring without any garbage preventing clear view.

Why USBSpy?

We offer a traffic monitor USB
Spy
. Designed for professional use, it lets you dig into packet traffic and analyze it in depth. Its use of time stamps, filters and triggering options provides for easier access to the core of the talk. USBSpy makes a powerful platform for testing and optimizing the communications between USB devices and the host system. You have the ability to drill into the data, to get detailed information about the traffic and the protocol itself. USBSpy provides you with advanced features necessary to ease the development and testing of USB devices. The summary of each transaction is supported with its binary code and other details. The monitoring software enhances your comprehension of what goes on at the bus.

USBSpy: Areas of Application

USB
Spy
provides a complex solution in the sphere of USB communications. Its area of application spans from studying USB topology to developing protocols. Here are some application areas where you can benefit from it:

  • Developing and Debugging Device Drivers
    When you develop a driver for a custom USB device, it is always useful to study I/O requests. USBSpy lets you choose any device registered in the host system and monitor its transactions with the root hub. The range of supported requests includes configuration, setup, data requests, and power management. Using the program's triggering options, it is easy to detect software, driver, and firmware problems. You can trigger on a variety of conditions including packet types, device requests, completion statuses, errors and many others. Triggers can be set up on almost any events. The support for hot-plugged devices allows recording requests right from the enumeration dialogue.
  • Debugging USB-bound Applications
    Support for URB structures and precise timing can be effectively used to debug applications programs that work with USB devices. Although USBSpy records all traffic of the selected device, you can apply filters to narrow down the view to just those packets that contain relevant communications. This is especially useful when devices with complex traffic are attached.
  • Debugging Firmware
    Firmware is at the core of the exchange of data requests between device endpoints and the real world. With USBSpy you can peel back the layers of a custom USB device to get close to the data sent and received at its endpoints. This will show how adequate the firmware performance is.
  • Solving Compatibility Issues
    Before new hardware or software can be implemented, administrators often run it through series of tests to make sure it can perform adequately. USBSpy provides the required testing environment when USB solutions are checked for compatibility.
  • Studying USB Communications
    Those studying USB topology can use USBSpy to examine the sequence of communications between a USB device and a host. They can see the difference between each of data transfer types and follow through it using detailed logs of requests. The log is presented in a clear and logical way, making it easier to grasp the purpose of each transaction. The details pane supply additional information on URB, IRP and IoStack Location.
  • Analysing and Debugging Protocols
    USBSpy makes it possible to analyse transactions between a USB device and its driver at the protocol layer. This allows using it while testing and debugging protocols.
  • Logging Debug Sessions
    You can log communications between a USB device and its host into file and reuse it later for analysis and debugging. A detailed log presents a summary of each transaction along with its binary code and support information. It is easy to analyse using the program's powerful filtering. Additionally, USBSpy allows exporting the log into XML format.
  • Tracing Communications and Events
    The program logs each event in the communications sequence with its own time stamp. Using the time stamps it is easy to follow through the whole communications sequence. USBSpy offers additional settings to tackle specific logging needs. You can, for instance, set it to intercept and record requests beginning the system boot.

All in all, USBSpy is one powerful tool that makes USB traffic readily accessible for analysis and debugging. Its filters and triggers cut the chase and present only required data. Its interface makes the communications easy to follow. Give it a try and see it for yourself.

USBSpy Features at a Glance

  • Interception of all I/O requests and events between a USD device and its host.
  • USBSpy doesn't create any additional filters, devices that could otherwise destroy the structure of drivers in your system.
  • Extended search and filtering options.
  • Triggers on packet types, device requests, completion statuses, errors, etc.
  • Automatic capture of hot-plugged devices.
  • Interception at system boot.
  • Export of traffic logs into XML.
  • Clear intuitive interface.

USB
Spy
, designed for recording and monitoring input/output requests of USB devices, supports the following types of requests:

  • URB (USB Request Block)
  • Hub and HID
  • PNP (Plug'n'Play)
  • Power
  • USB Internal ioctls
  • Remove events

In-purchase Benefits

Upon registering, you will have an opportunity to:

  • Use the program for more than 15 days.
  • Remove the nag screen and enable all features of the product.
  • Get unlimited Technical Support during 12 months.
  • Free updates for one year and steep discounts for upgrades for future versions after the one-year period expires.

Price: Start from $79.00 per copy

» Buy USBSpy Now!

All information will be encrypted before transmission to prevent possible interception by a third party. Your transmissions while in this area are absolutely secure and private.

If you have questions regarding the purchase of our products, please contact us.

News & Events

March 31, 2012

Lock Folder XP 3.9.2 has been released.

Lock Folder XP offers quick and effective folder locking.

March 19, 2012

New! Universal Shield 4.7 has been released.

June 25, 2011

Universal Shield 4.6 has been released.

The program uses the most secure protection method — hiding and encrypting the data. Now it is possible to encrypt folders, protect files and folders in Windows Safe Mode and automatically enable protection if the computer has been idle for a while. We have also improved the look and feel of the program with an improved interface.

March 09, 2011

Protect Folder 3.1 has been released. Password protection for folders or entire removable drives. Protect Folder provides on-the-fly protection of your removable USB drives.

Related Links

USB Monitor Software - don't skip a single bit of data on your USB devices activity.