In my previous post on RedPitaya, I showed the web interface of RedPitaya. While the web interface is nice for ad-hoc experiments, the Red Pitaya command line interface (CLI) gives new ways to generate custom signals and measurements.
To use the Unix shell on RedPitaya, you can use ssh.
Before you can execute commands from the command-line, you must know the RedPitaya IP address.
If you have setup RedPitaya with a dynamic IP address, you can use the following nmap command to lookup its IP address:
$ nmap -p 80 --open -sV 192.168.2.0/24
This port scan will take some seconds, but if everything works, you will see something along these lines:
Starting Nmap 6.46 ( http://nmap.org ) at 2014-07-13 14:10 CEST Strange error from connect (65):No route to host Nmap scan report for speedport.ip (192.168.2.1) Host is up (0.0024s latency). PORT STATE SERVICE VERSION 80/tcp open http Router HAD23V WAP http config Service Info: Device: WAP Nmap scan report for HAD23V_02 (192.168.2.103) Host is up (0.024s latency). PORT STATE SERVICE VERSION 80/tcp open http nginx 1.5.3 Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 256 IP addresses (3 hosts up) scanned in 8.67 seconds
Now, we can use the IP of 192.168.2.103
Now, let call ssh as follows:
$ ssh firstname.lastname@example.org
Both, the username and password are “root”.
From here, you can run the commands:
You can even write your own commands and cross-compile e.g. a square wave generator.