Skip to content

mcsigrok

Bring logic analysis into your Claude workflow. Scan hardware, capture signals, decode 131 protocols — all through MCP.

mcsigrok is an MCP server that wraps sigrok — the open-source signal analysis suite — and exposes its capabilities as structured tools. Connect a logic analyzer, describe what you want to capture, and Claude handles the command-line details.

No more memorizing sigrok-cli flags. No more copy-pasting hex dumps into chat. The signal data flows directly into context.

12 Tools

Scan devices, capture signals, decode protocols, manage sessions — full lifecycle from hardware discovery to data export.

131 Decoders

UART, SPI, I2C, CAN, JTAG, USB, and 125 more protocol decoders. Stack them for higher-level analysis like UART → Modbus.

5 Resources

Structured access to the decoder catalog, tag taxonomy, sample rate reference, and live session list.

4 Prompts

Guided workflows for debugging protocols, exploring hardware, re-analyzing sessions, and stacking decoders.

Terminal window
# Install from PyPI
pip install mcsigrok
# Add to Claude Code
claude mcp add mcsigrok -- uvx mcsigrok
  1. Scanscan_devices discovers connected logic analyzers
  2. Capturecapture acquires signals at a specified sample rate
  3. Decodedecode_capture runs a protocol decoder against the saved session
  4. Iterate — re-decode the same session with different decoders or options, no re-acquisition needed

Every capture is saved as a .sr session file. Decode it now, decode it later, export it to CSV or VCD — the raw data is always preserved.

AreaToolsDescription
Discoveryscan_devices, show_device, list_driversFind and inspect connected hardware
CapturecaptureAcquire digital signals to a session file
Decodedecode_capture, decode_live, list_decoders, decoder_infoProtocol analysis with 131 decoders
Sessionslist_sessions, session_info, export_session, delete_sessionManage captured data