The best time to document your system is while it's running. Extracting project files, mapping registers, and creating proper backups from a working HMI is straightforward work. It takes hours, not weeks. It costs a fraction of what recovery costs. If your system is running and undocumented, start with a backup — not on this page.
But if project files are already lost and the hardware has failed, this is where we come in. We recover programs from existing hardware, reverse-engineer Modbus register maps, and document what's actually running on your equipment — so you're never in this position again.
What We Offer
- Proactive documentation of working systems to avoid reverse engineering entirely
- Project file extraction and backup from operational HMI panels
- Recovering programs from failed or locked HMI panels
- Reverse-engineering Modbus register maps from undocumented systems
- Rebuilding HMI projects when original project files are lost
- Decompiling and documenting existing PLC programs where possible
- Legacy system assessment and full documentation
The Smart Path: Document It Now
If your HMI is currently working, you can avoid everything below. We connect to your running system, extract the project files, map the registers, document the screens, and hand you a complete backup package. If the hardware fails next year, recovery becomes a straightforward panel swap and program upload — instead of weeks of detective work. Get in touch to arrange a backup before it's too late.
When Prevention Wasn't an Option
There are a handful of situations where reverse engineering becomes the only path forward — because documentation was never done. The original system integrator has moved on, closed their business, or simply refuses to hand over the project files. The HMI panel has been running for years without a backup ever being taken, and now the hardware has failed. A locked PLC or panel is protecting code that nobody in your organisation knows how to access. A system was built around undocumented Modbus device registers and nobody wrote down what address maps to what.
In each of these cases, the machine is either down or at serious risk — and there's no clean path to recovery without someone willing to do the detective work. We interrogate existing hardware, monitor live communications, probe register ranges, and piece together what's running so we can either restore it exactly as it was or document it well enough that a proper rebuild can begin.
This work is methodical and not always quick, but it's often the difference between restarting production and writing off equipment entirely. We give you a clear picture of what you have, what it does, and what's needed to keep it — or replace it — safely.