It's often impossible to reverse engineer and document a protocol or replace a proprietary tool without breaking DRM first.
It's often impossible to reverse engineer and document a protocol or replace a proprietary tool without breaking DRM first.