As for decyphering the contents of the eval function, that's usually fairly easy. Replace the very beginning of the eval function call and opening paren:
eval(
WITH:
var AAAAA =
And then the very end of that long line (careful, don't break the string!) is usually either just an ending paren-> ) <-or an ending paren plus semi-colon-> ); <-
Remove the ending paren.
So we are essentially assigning the value of the function being evaluated (well, the function's return value) to our variable AAAAA. Then, in a browser other than IE (IE won't let you copy and paste from alert boxes), such as firefox, add:
alert(AAAAA);
Then copy the contents of the alert in to your text editor of choice. You now have the actual, de-obfuscated (though still minified and all jumbled together) code that is actually used by the script. As for further de-minifying it, well that can be done with a number of regex's and or tedious manual re-formatting. For your purposes here though, the only thing you are really interested in is that the code contains a function named "doRefresh" which is used to make ajax request to a url on the site which is contained in a variable in the "doRefresh" function:
var url='../D001/_@V_.asp?random='+ran_number;
And that is the location of the data you seek, basically the url you already have, replace "M001/viewF.asp" with "D001/_@V_.asp" and it will work without the ?random= parameter and value, it appears they were using the random parameter as a method of ensuring retrieval of non-cached response from server, which may be an issue you will want to address in your application.
You may note on that _@V_.asp page that they have the data layed out by column already for you, with "__header_=0" or "#__header_=0" preceding each row group of columns, col0 being the first column in a row in the table and col4 being the last column in a row.
Incidentally, I did a few tests attempting to retrieve the _@V_.asp page's content via php with CURL and also file_get_contents using the context option, and all my attempts were futile as their application apparently is smart enough to block my script access attempts or else I'm not getting something right, possibly in regards to the secure https protocol though I do have openssl and all that jazz, so if you have a method of retrieving it via scripting do let me know how please! (have not done any perl yet, or much with https protocols). Directly accessing in browser is of course no problem.
Hope this is helpful, good luck!