Last updated on by Oliver Reed
SerialTool includes a powerful COM Sniffer that lets you monitor, capture, and analyze serial communication in real time. It is designed for professional debugging of RS232, RS485, TTL, and virtual COM ports, with advanced features for logging, traffic inspection, and detailed communication analysis.
COM Sniffer is a professional serial port monitoring tool with a kernel driver that captures all COM port traffic, including transmitted and received data, DTR/RTS changes, baud rate updates, and IOCTL activity. It is ideal for debugging serial communication used by third-party software or your own applications.
COM Sniffer includes a powerful kernel driver that allows you to monitor all serial port traffic on a COM port, even when it is being used by third-party software.
It captures and displays all transmitted and received serial data in real time, giving you full visibility into the communication flow of the port.
COM Sniffer can also detect and distinguish important serial events and control operations such as DTR, RTS, baud rate changes, and all IOCTL activities, making it an advanced tool for serial port monitoring and debugging.
It is an essential utility for serial communication debugging, whether you need to inspect software developed by third parties or you are a developer building and testing your own serial port application.
By showing exactly what your application sends and receives at every step, COM Sniffer helps you save hours of debugging time and quickly identify communication errors, configuration problems, and protocol issues.
Read MoreSerialTool includes a powerful Modbus Client (Master) for Serial RTU/ASCII and TCP over IPv4 and IPv6, with support for register reading and writing, automatic polling, Modbus device mapping, remote slave scanning, traffic monitoring, live charts, and raw command execution.
It is designed for professional testing and debugging of industrial Modbus devices, and it also supports exporting device mappings in CSV, Text, and PDF format.
Read More .
The Portable version of SerialTool allows you to run SerialTool without installing it on your system or
performing a setup. For the Portable version, we use the AppImage packager, which requires only that the FUSE library is installed on your system.
The FUSE userspace library (libfuse) is typically available via your distribution’s package manager. It is recommended to refer to the distribution's package manager of your specific Linux distribution.
$> sudo add-apt-repository universe
$> sudo apt install libfuse2
$> chmod +x [file name inside the zip, e.g., SerialTool_2.1.0_Linux64_Portable]
$> ./[file name inside the zip, e.g., SerialTool_2.1.0_Linux64_Portable]
The ZIP archive containing SerialTool includes detailed instructions for installation.
If Serial Port is not opening it may be because the device file of the serial port does not have permissions to allow to currently logged in user to “read” or “write” to the serial device.
1. Open Terminal and replace <username> with your username.
ubuntu@ubuntu:~$ sudo usermod -a -G dialout <username>
If the group wasn’t found, or if you still get an error, the dialout group may have a different name.
1. Open Terminal and enter this command:
ubuntu@ubuntu:~$ ls -l <port>
2. Take note of the group name in the response:
ubuntu@ubuntu:~$ crw-rw---- 1 <user> <group> 188, 0 1 jan 12.32 <port>
3. To add your user to the group, enter the following command in the terminal, replacing <group> with the group name from the previous step, and <username> with your username:
ubuntu@ubuntu:~$ sudo usermod -a -G <group> <username>
4. Sign in and out for the changes to take effect.
SerialTool is not deployed by an Apple identified developer at the moment. SerialTool is not containing any malware or harmful code like many other applications available on the internet and you need to override the security settings.
Due to enhanced security measures introduced in macOS 15.x Sequoia, applications downloaded from the internet may be flagged by Gatekeeper and prevented from running. If you encounter a message stating that “SerialTool is damaged and can’t be opened” or similar, it is not an error in the application, it is a result of the system quarantine flag.
You can enable SerialTool directly from MacOS Terminal (adjusting the path if needed):
sudo xattr -rd com.apple.quarantine /path/to/SerialTool.app
Press Return, then enter your administrator password when prompted.
Once the quarantine is removed, simply double-click the SerialTool.dmg file in the ZIP archive.
The ZIP archive containing SerialTool includes detailed instructions for installation.
Here is the answer to some frequently asked questions about using the free version of SerialTool.
If you have any questions, you may contact us at any time.