Solved

Editing a Lowrance HDS .USR file

Posted on 2010-09-04
3
2,305 Views
Last Modified: 2012-05-10
I'm wanting to open a file for editing. They are waypoint and route files for Lowrance HDS units and I am not sure what they are written in. What I would like to do is open them in a text editor type program so that I can search and replace text pointing to the icons to use to multiple points at once and add remove multiple points at once.

The only clue I have is one site that refered to the files as being in "vector" format.

Can anyone help to identify what it is written in or how I can open it and save it in an ediing program?

Link to test file:

http://rapidshare.com/files/416981196/Test2.usr.html

Thanks,

Haydan
0
Comment
Question by:Haydan
3 Comments
 
LVL 46

Expert Comment

by:tbsgadi
ID: 33606216
0
 
LVL 108

Accepted Solution

by:
Ray Paseur earned 500 total points
ID: 33606398
EE offers us the ability to attach a file.  It is much less annoying than Rapid Share.  Going forward, you might want to use the EE tools.  I looked at the file, and I can't really add much to the AUSFish link.  Files named .usr are often binary data bases of some sort.
http://www.file-extensions.org/usr-file-extension

The file is captioned "Navico export data file"
http://lmgtfy.com?q=Navico+export+data+file

More on Navico here:
http://en.wikipedia.org/wiki/Navico

It looks like there may be some version dependent characteristics to these files.  You might want to contact Navico / Lowrance directly to see what they can tell you about how to process the file -- it might be faster than trying to research it yourself.

Good luck with your project, ~Ray
0
 

Author Closing Comment

by:Haydan
ID: 33613504
Looks as though only lowrance can answer this one,

Thanks
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
firstChar challenge 13 110
base64 decode encode 12 121
recursion example 16 111
When i run adoquery my application freezes 26 150
This article will show, step by step, how to integrate R code into a R Sweave document
A short article about a problem I had getting the GPS LocationListener working.
This tutorial demonstrates how to identify and create boundary or building outlines in Google Maps. In this example, I outline the boundaries of an enclosed skatepark within a community park.  Login to your Google Account, then  Google for "Google M…
This tutorial walks through the best practices in adding a local business to Google Maps including how to properly search for duplicates, marker placement, and inputing business details. Login to your Google Account, then search for "Google Mapmaker…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now