https://github.com/rhruiz/hid_send
Hack to send raw HID commands to my qmk firmware keymap
https://github.com/rhruiz/hid_send
Last synced: 2 months ago
JSON representation
Hack to send raw HID commands to my qmk firmware keymap
- Host: GitHub
- URL: https://github.com/rhruiz/hid_send
- Owner: rhruiz
- Created: 2018-11-16T21:30:51.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2024-06-16T21:22:51.000Z (12 months ago)
- Last Synced: 2025-02-09T15:22:14.888Z (4 months ago)
- Language: C
- Size: 27.3 KB
- Stars: 10
- Watchers: 4
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Send HID raw data command line tool
This sends commands to be used by qmk firmware that handles raw HID data.
This is completely stolen from [Zeal60 command line tool](https://github.com/Wilba6582/zeal60).
## Setup
This asumes `qmk` is cloned next to this folder:
```
git clone [email protected]:rhruiz/hid_send.git
git clone [email protected]:rhruiz/qmk-userspace.git qmk_userspace
```### macOS setup
```shell
brew instal hidapi # brew qmk/qmk/qmk already installed this
```## Building
Just run:
```
cd hid_send
make
```## Setting vendor and product id
Default values are taken from the constants in hid_send.c and they can be
overriden using VID and PID environment variables just be sure to use hex
numbers with 0x format like `0xFEED`.These variables may also be set when running `make` and the binary will be
generated to values by default.