BMW Forum - BimmerFest BMW Forums banner

Accessing or changing EOS test code using INPA/Tool32

9.2K views 13 replies 8 participants last post by  God-Follower  
#1 ·
Hi All,

Does anyone with experience of INPA/Tool32 know if there is any function associated with exposing the EOS test code that is saved to the SME.

I think there are a few of us attempting to do this across multiple forums and in different parts of the world. Achieving it would prevent me having to spend circa ÂŁ8000 on a BMW EOS tester to activate the high voltage system on my accident damaged i3.

Alternatively, are there any experts out there that would be willing to look into achieving this (happy to pay!)?

Thank you.
 
#2 ·
This is an interesting proposition. I agree, we have seen a few users who have been looking at alternative ways to achieve EOS test codes.

One the one hand, the purpose of the EOS test is to verify the integrity and safety of the HV system inside the battery prior to installing it in the vehicle; not a bad idea, especially after it has been involved in an accident or serviced.

On the other hand, practicality plays a part in it too...if the battery has been physically and electrically inspected by other means, having a method to unlock the contactors would be advantageous.

Have you tried simply forcing the SME to program bootloader and software with E-Sys, to see if it wipes out the memory of the contactors being blocked? Just spitballing here.

Or digging around in E-Sys to see if it is a simple FDL flag that gets changed when the contactors are blocked.
 
#7 ·
Having exhausted everything I can think of to bypass the EOS test I've now gone and bought an EOS tester...

It arrives in the next few days so hopefully it'll work!
Let us know how it goes thru with the EOS. I am playing with a crashed 2019 740e and I am having the exact same problem.
Or let me know if you want to re-sell the EOS.
Hi, where are you based in the world? I can rent the Eos tester to you but don't really want to sell it as I'm sure I'll need it again.