Skip to content

Progress reverse engineering OPZ #1

@patriciogonzalezvivo

Description

@patriciogonzalezvivo

Hi! I want to thank you for the valuable documentation here. With it I manage to make some progress decoding the SYSEX messages from the OP-Z. Like for example:

My final goal is to be able to print the pattern do you happen to have an example on how to decompress the SYSEX 0x09 message for patterns using zlib?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions