Tools / Command-Line Tool

nibbler

Python toolkit for analysing Apple II WOZ disk images — from raw flux data to annotated 6502 assembly source in eight commands.

Python 3.9+ MIT
apple-ii6502copy-protectionretrocomputingtool
↗ Repository

Tested on: Windows 11 · Python 3.13

nibbler is a command-line toolkit for analysing Apple II WOZ disk images. It grew from the 39 individual scripts written during the Apple Panic reverse engineering project and was consolidated into a general-purpose tool that works on any WOZ2 file.

Commands

CommandPurpose
infoDisplay WOZ file metadata and disk geometry
scanScan all tracks for address/data markers and sector layout
protectDetect copy-protection signatures and non-standard encoding
nibblesDump raw nibble stream with marker highlighting
decodeDecode sectors to binary, with denibblisation
bootTrace the boot sequence through RWTS and DOS
dskConvert WOZ to standard 140K DSK image
fluxRender top-down grayscale visualization of magnetic flux patterns

Companion disassemblers

The Orchard repository also hosts two general-purpose disassemblers that are accessed via the same CLI as separate subcommands but are independent tools — they have no WOZ dependency and work on any binary:

Usage

git clone https://github.com/BrentRector/orchard
cd orchard
python -m nibbler <command> <woz_file> [options]

No package installation required. Zero dependencies beyond the Python standard library.

Documentation

For full command reference with real outputs and explanations, see nibbler: A WOZ Disk Analysis Toolkit — the complete guide demonstrated against a copy-protected Apple Panic disk image.

← All Tools