Tools / Command-Line Tool
nibbler
Python toolkit for analysing Apple II WOZ disk images — from raw flux data to annotated 6502 assembly source in eight commands.
Tested on: Windows 11 · Python 3.13
nibbler is a command-line toolkit for analysing Apple II WOZ disk images. It grew from the 39 individual scripts written during the Apple Panic reverse engineering project and was consolidated into a general-purpose tool that works on any WOZ2 file.
Commands
| Command | Purpose |
|---|---|
info | Display WOZ file metadata and disk geometry |
scan | Scan all tracks for address/data markers and sector layout |
protect | Detect copy-protection signatures and non-standard encoding |
nibbles | Dump raw nibble stream with marker highlighting |
decode | Decode sectors to binary, with denibblisation |
boot | Trace the boot sequence through RWTS and DOS |
dsk | Convert WOZ to standard 140K DSK image |
flux | Render top-down grayscale visualization of magnetic flux patterns |
Companion disassemblers
The Orchard repository also hosts two general-purpose disassemblers that are accessed via the same CLI as separate subcommands but are independent tools — they have no WOZ dependency and work on any binary:
- 6502 Disassembler —
nibbler disasmsubcommand - Z-80 Disassembler —
nibbler z80disasmsubcommand
Usage
git clone https://github.com/BrentRector/orchard
cd orchard
python -m nibbler <command> <woz_file> [options]
No package installation required. Zero dependencies beyond the Python standard library.
Documentation
For full command reference with real outputs and explanations, see nibbler: A WOZ Disk Analysis Toolkit — the complete guide demonstrated against a copy-protected Apple Panic disk image.