A web tool for tinkering with Niimbot label printers.
Most of the packet info came from kjy00302/niimprint and AndBondStyle/niimprint so big thanks to them.
All of this has only been tested on Windows with the Niimbot B1 but from what I understand, many of the same packet types are used across the various models.
You can run the tool locally or view it on GitHub pages. The data used by the tool comes from exported WireShark packet dissections.
To capture your own USB packets:
- Make sure to include USBPcap when installing WireShark.
- Select the USB port where the printer is plugged into.
- Begin the capture and start the Niimbot desktop app. Perform whatever operations you want to capture.
- Optionally, apply a filter to limit the packets to only the Niimbot related ones. This can be done with something like
usb.src == "1.10.1" or usb.dst == "1.10.1"
replacing1.10.1
with your printer's address. - Go to
File > Export Packet Dissections... > As JSON...
. Make sure "Displayed" is selected under "Packet Range" or you'll export everything. - You can now load this file in NiimbotJS-Tools.
The packet explorer is similar to the view you get in WireShark but the packet is decoded based on how Niimbot packets are structured. You can view the packet codes used by the name column here. Clicking on one of the payload bytes columns will open the bytes inspector which is useful when you aren't sure what data is stored in the packet.
This tool attempts to reconstruct the images transmitted to the printer including the optimizations done by the stock app.
This tool generates a calibration label that can be useful when checking your alignment.