EDID Structure


Driver authentication can be based on EDID pnp manufacturer id, as set up in the example for Viewsonic

Under MacOS the EDID 'encoded values' can be dumped to a file using the command

sudo ioreg -l | grep IODisplayEDID > ~/edid ( where –l = (l for London) and | = Pipe character)

The first command creates a file ~/edid in the home folder the second command below simply prints the content for illustration

 

or you can just view it:

Kitchen-iMac-2:~ Dave$ ioreg -lw0 | grep IODisplayEDID
"IODisplayEDID" =<00ffffffffffff0006100ca00000000032140104b5301b78226fb1a7554c9e250c5054000000010101010101010101010101010101011a3680a070381f4030203500db0b1100001a8d0ec0a0301c102030203500db0b1100001a000000fc00694d61630a202020202020202000000000000000000000000000000000000001d902030cc123090707830100001a3680a070381f4030203500db0b1100001a8d0ec0a0301c102030203500db0b1100001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000056>
Kitchen-iMac-2:~ Dave$ 

Manufacturer code from EDID on Windows is the 1st 3 characters of the registry entry – example highlighted below for DELL monitor.

The EDID structure is described:

https://en.wikipedia.org/wiki/Extended_Display_Identification_Data

specifically: Manufacturer ID. This is a legacy Plug and Play ID assigned by Microsoft, which is a big-endian 16-bit value made up of three 5-bit letters: 00001, A; 00010, B; …; 11010, Z. E.g., 24 4d, 0 01001 00010 01101, "IBM".

https://www.extron.com/article/uedid

There are some utilities that can be used to visually interpret EDID data structures:

https://www.entechtaiwan.com/util/moninfo.shtm

https://www.nirsoft.net/utils/monitor_info_view.html

Search