A collection of tools to do many things to a windows CE device via Activesync/RAPI. These tools should work on most CE devices, tested on Ipaq, XDA(Wallaby), XDA-II(Himalaya), XDA-IIs(Blueangel), MDA Compact(Magician), i-mate SP3, i-mate SP3i, Yakumo P300, MPx200, Voq, Mitac Mio, Mitac Megas. with PocketPC 2002, PocketPC 2003, Windows Mobile 2003, Windows Mobile 2003 Second Edition, Smartphone 2002, Smartphone 2003, smartphone 2005, windows mobile 2005. ( wince 3.0 and wince 4.2 and wince 5.0 )
these are:
pps - dumps active wince processes pdblist - dumps wince databases pdel - delete wince file pdir - list wince directory pmkdir - create wince directory pget - copy file from wince pkill - kill wince process preboot - reboot wince device ppostmsg - send/post windows msgs to wince windows pmemdump - copy memory block from wince psetmem - set RAM memory location in your device pmemmap - list available memory blocks on wince pput - copy file to wince pregutl - manipulate the wince registry prun - run program in wince dump - hexdump local file. pdebug - capture debugoutput of processes pdocread - raw read from disk-on-chip in your device pdocwrite - raw write from disk-on-chip in your device psdread - raw read from sd card in your device psdwrite - raw write to the sd card in your device pnewbmp - write new bootsplash bitmap to rom pnewbootloader - replace your bootloader prapi - interface to wince provisioning config api psynctime - sync time with pc.
NOTE: sdread, sdwrite, postmsg, memdump, setmem and regutl are similar tools, but operate on your pc, instead of a remote device.
.... experimental stuff: pgsmdump - attempt at memory dumper for gsm. pget2 - attempt at improvement of pget tlbdump - dumps virtual to physical memory mapping riltest - dumps all kinds of info from the phone via ril pcmon - attempt to talk 'rsupgrade'-protocol testpi - tool to find out what handles are open on your PPC tsttffs - tool to experiment with the trueffs API
NOTE: The experimental tools may not work, or may even cause damage. Use at your own risk, and after reading the source, and making sure you understand what they do!!!
some are vaguely based on the sample code in the pocketpc sdk.