Skip to content
This repository was archived by the owner on Jul 15, 2025. It is now read-only.
This repository was archived by the owner on Jul 15, 2025. It is now read-only.

Working on a PyCom FiPy with INMP411, searching for a FFT analysis part #14

@ClemensGruber

Description

@ClemensGruber

We can confirm that the record-mono-mic-to-sdcard.py example works with slight adaptions on a PyCom FiPy with an INMP411 I2S mic, see for details: https://community.hiveeyes.org/t/erschliessung-von-i2s-support-und-fft-fur-micropython-auf-pycom-esp32/2331/30

We used our home brewed firmware with your I2S driver, the official PyCom firmware has this driver not build in yet! Use at least version FiPy-1.20.1.r1-0.7.0-vanilla-dragonfly-onewire-i2s.tar.gz or better a newer release, see Dragonfly firmware for Pycom/ESP32.

Now we like to analyze the audio stream with a FFT to get smaller data packages we can easily forward with a not so high bandwidth telemetry. Do you have some code or examples to analyze the I2S output with a FFT or can point us to existing snippets?

ping @amotl

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions

      pFad - Phonifier reborn

      Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

      Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


      Alternative Proxies:

      Alternative Proxy

      pFad Proxy

      pFad v3 Proxy

      pFad v4 Proxy