So if someone can get such a dump (from the lucky ones having the real device already on their benches), it will inform my analysis. I know this information is rather fragmented and incomplete, but I'm still putting the pieces together and have more juicy bits for future posts.
Attached is the contents of the 256 kB file env.bin. (It starts with a CRC32, the file attached, and the rest is 0x00...)
What would be interesting to know, is if the AES_KEY is the same for all machines, or if each one is unique.
It's the same since it's embedded in the cfger app. You can see the decrypted_scripts of the DS7000 using the same key in my updated DS7000 msg.
BTW, interesting that the memdump contains these references:
200MHz to 350MHz Bandwidth Upgrade Option
200MHz to 500MHz Bandwidth Upgrade Option
350MHz to 500MHz Bandwidth Upgrade Option
600MHz to 1GHz Bandwidth Upgrade Option
600MHz to 2GHz Bandwidth Upgrade Option
1GHz to 2GHz Bandwidth Upgrade Option