Reverse Engineering a Children's Learning Device

2025-04-06
Reverse Engineering a Children's Learning Device

This blog post details the author's first reverse engineering project: a children's learning device (LeapFrog LeapStart/VTech MagiBook). The journey begins with acquiring the firmware from the VTech software's cache files. Key files identified include 'System' and 'FileSys'. 'FileSys' is a FAT32 filesystem image containing app, audio, and book data. 'System' appears to be an ARM binary, containing C++ information, logs, and kernel information (uC/OS-II). Future steps involve deeper analysis of these files, aiming to understand the dot-recognition and audio playback code, and potentially adding custom audio.

Development firmware analysis