diff --git a/docs/development/wireshark.md b/docs/development/wireshark.md index a4c64c2f..c8980fd5 100644 --- a/docs/development/wireshark.md +++ b/docs/development/wireshark.md @@ -37,6 +37,13 @@ To tell the CFLIB to generate a PCAP file of what it thinks the CRTP traffic loo $ CRTP_PCAP_LOG=filename.pcap python3 examples/swarm/hl-commander-swarm.py $ wireshark filename.pcap ``` +and on Windows based computers in a shell window: + +```bash +> set CRTP_PCAP_LOG=filename.pcap +> python3 examples/swarm/hl-commander-swarm.py +> wireshark filename.pcap +``` To generate a PCAP file and open it with Wireshark. You can also use the text based `tshark` tool, and you can add a filter, for instance, only shoow CRTP port 8 (Highlevel setpoint): ```bash