当前位置:网站首页>App mobile terminal test [3] ADB command
App mobile terminal test [3] ADB command
2022-07-03 15:52:00 【Leo_ Eagle】
Adb(android Debug Bridge), It allows real machines and simulators ( Or mobile assistant ) communicate . This greatly improves the equipment ( Real machine ) Convenient operation .
1.ADB The cognitive
1.1 Adb The cognitive
Adb(android Debug Bridge), It allows real machines and simulators ( Or mobile assistant ) communicate . This greatly improves the equipment ( Real machine ) Convenient operation
The teacher's , Android sdk The path is as follows :D:\Program Files (x86)\Android\android-sdk\platform-tools, In this directory, you can see adb At the beginning 3 File ,
verification adb Whether the configuration is complete . stay Cmd Input in adb
Cmd
Adb
1.2 Adb How it works
start-up adb client , The client will communicate with the local TCP port (5037) binding , Then start listening adb All commands issued by the client , Then use the port 5037 And adb Server communication .
1.3 Enable adb debugging
It must be started on the mobile phone usb debugging , Only then can we carry on adb debugging ( If you don't know how to turn on your mobile phone usb debugging , Please check the previous article :uiautomator
++App Mobile Testing 【2】 Android simulator deployment ++).
1.4 Adb The basic order of
stay cmd The following is executed in
- see adb edition
C:\Users\Leo>adb version
- View device information
C:\Users\Leo>adb devices
List of devices attached
* daemon not running; starting now at tcp:5037
* daemon started successfully
GWY0217306003796 unauthorized
2. ADB The basic order of
2.1 Adb The basic order of
- see adb edition
C:\Users\Leo>adb version
- View device information
C:\Users\Leo>adb devices
List of devices attached
* daemon not running; starting now at tcp:5037
* daemon started successfully
GWY0217306003796 unauthorized
- Connect the simulator
C:\Users\Leo>adb connect 127.0.0.1:62001
matters needing attention : The first of the night God simulator 1 The port of the simulator is 62001, The first 2 The stage is 62025, The first 3 platform 62025+1.
C:\Users\Leo>adb connect 127.0.0.1:62001
adb server version (36) doesn't match this client (40); killing...
reason : The above (adb server version (36) doesn’t ….) The reason for the hint , Because android sdk Medium adb Version and simulator adb Different versions result in .
Solution :
hold android sdk Next 3 individual adb Opening file ( Here's the picture ), Copy to the simulator , Replace simulator (D:\Program Files\Nox\bin) Corresponding 3 File ( Here's the picture ).
- Adb shell
Adb shell
When there are multiple devices ( Simulator Links pc When )
C:\Users\Leo>adb -s 127.0.0.1:62001 shell
[email protected]:/ #
Format adb –s Simulator required ip And port shell
Test intensive video
If you don't find your article enjoyable , You can see the detailed video tutorial .
《 Necessary skills for Mobile Testing 》
UI automated testing :Selenium3 automated testing
【 Test the full series of video courses 】
The learning route is as follows




边栏推荐
- Jvm-04-runtime data area heap, method area
- Problems of CString in multithreading
- 秒杀系统3-商品列表和商品详情
- About text selection in web pages and counting the length of selected text
- Microservice API gateway zuul
- 求字符串函数和长度不受限制的字符串函数的详解
- 通过进程PID获取可执行文件路径(QueryFullProcessImageName)
- [system safety] 43 PowerShell malicious code detection series (5) automatic extraction of ten thousand words from abstract syntax tree
- 潘多拉 IOT 开发板学习(HAL 库)—— 实验5 外部中断实验(学习笔记)
- Redis在Windows以及Linux系统下的安装
猜你喜欢

Digital image processing -- popular Canny edge detection

半监督学习

The markdown file obtains the pictures of the network and stores them locally and modifies the URL

Detailed pointer advanced 1

Seckill system 3- product list and product details
![[system safety] 43 PowerShell malicious code detection series (5) automatic extraction of ten thousand words from abstract syntax tree](/img/cd/00954b9c592c253d42e6a3b8298999.jpg)
[system safety] 43 PowerShell malicious code detection series (5) automatic extraction of ten thousand words from abstract syntax tree

Microservices Seata distributed transactions

Detailed explanation of string function and string function with unlimited length

Secsha system 1- login function

如何使用 @NotNull等注解校验 并全局异常处理
随机推荐
软件逆向破解入门系列(1)—xdbg32/64的常见配置及功能窗口
Calibre LVL
Microservice API gateway zuul
App mobile terminal test [5] file writing and reading
坚持输出需要不断学习
Detailed pointer advanced 2
互斥对象与临界区的区别
Principles of several common IO models
“用Android复刻Apple产品UI”(3)—优雅的数据统计图表
求字符串函数和长度不受限制的字符串函数的详解
如何使用 @NotNull等注解校验 并全局异常处理
How are integer and floating-point types stored in memory
do{}while()的妙用
Qt常用语句备忘
Unityshader - materialcapture material capture effect (Emerald axe)
Detailed pointer advanced 1
阿飞的期望
WinDbg分析dump文件
Jvm-02-class loading subsystem
Get the executable path through the process PID (queryfullprocessimagename)