There's a method in MobileDevice.framework (the private framework used to communicate with iOS devices from your Mac over USB) called AMDeviceCopyValue(). It takes two strings as arguments: domain and key. I've been able to find some domains and keys that work online, but I can't find the pair that will tell you how many charge cycles are on the iOS device's battery.
There's another program, iCopyBot, which can do this (http://www.icopybot.com/blog/check-ipad-iphone-battery-charge-cycle-count-without-jailbreaking.htm). I've already downloaded and ran the program, and have seen that it works.
I was thinking that if I had a USB Sniffer program of some sort, I could see all the values that the program sends over USB to the connected iOS device, and from that, see what domain/key pairs they use to get how many charge cycles are on the iOS device's battery.
Does anyone know of such a USB sniffer program that I could use? Or maybe you have another suggestion for how I might get these strings. I already have run the terminal command strings on both the binary of MobileDevice and iCopyBot, and while it did include some domains and keys that I knew of already (and some I didn't already know of) - none of them were helpful in extracting this data.
There's another program, iCopyBot, which can do this (http://www.icopybot.com/blog/check-ipad-iphone-battery-charge-cycle-count-without-jailbreaking.htm). I've already downloaded and ran the program, and have seen that it works.
I was thinking that if I had a USB Sniffer program of some sort, I could see all the values that the program sends over USB to the connected iOS device, and from that, see what domain/key pairs they use to get how many charge cycles are on the iOS device's battery.
Does anyone know of such a USB sniffer program that I could use? Or maybe you have another suggestion for how I might get these strings. I already have run the terminal command strings on both the binary of MobileDevice and iCopyBot, and while it did include some domains and keys that I knew of already (and some I didn't already know of) - none of them were helpful in extracting this data.
Last edited: