Summary
Prim Rogue
A single bit of computer memory became sentient and decided to escape from digital into the real world. Explore RAM, modify bytes and hack machine code and CPU registers to set it free.
You play the game as a single bit of computer memory. You can invade other bytes around you and thus modify their values.
The game features various types of puzzles:
With ability to XOR into adjacent bytes, you can navigate your way through existing data in the memory. The game automatically marks the bytes you cannot go through without getting yourself overwritten and prevents you entering those. Both binary and ASCII views are available, which you can utilize to find an open path for a particular puzzle.
Various programs run on the computer you are trying to escape from. The game includes a disassembler showing you the assembly language corresponding to the machine code that is being executed. Don’t worry if you don’t know any Assembly. There are only a handful of CPU instructions and they are introduced gradually as you complete the puzzles. Reading the assembly code, you can track the program logic, see which parts of RAM it reads and writes to and manipulate data in those locations to get the program to do what you want.
The computer you are trying to escape has a simple CPU with a couple of registers. You can trick the CPU to load yourself into the registers and affect code execution or offload yourself into otherwise unreachable memory locations.
For some puzzles, it isn’t enough to change the data in RAM or registers. You can also change the machine code to get the computer to do different things.
Carefully observe the bytes on the screen and what the CPU is doing. Sometimes you need to read the code in straightforward manner. Sometimes you need to work your way backwards: find the line of the code you want executed and then trace the code backwards to figure out how to trick the CPU to get to that instruction.
The game only has about 30 puzzles, but some of those might take considerable effort to solve. So take it easy and don’t rush to the end. If you solve a puzzle by accident, don’t go forward until you understand why it happened. You might miss some small detail and get completely stuck on the next puzzle.
The game is about the way computers work internally. This isn’t a game about writing new programs, but hacking existing programs and their data to clear the path or teleport across memory until you find a way to escape the computer completely.
Having some programming knowledge makes the game easier, but it isn’t required. All the elements required to solve the puzzles are explained in the game.
You play the game as a single bit of computer memory. You can invade other bytes around you and thus modify their values.
The game features various types of puzzles:
With ability to XOR into adjacent bytes, you can navigate your way through existing data in the memory. The game automatically marks the bytes you cannot go through without getting yourself overwritten and prevents you entering those. Both binary and ASCII views are available, which you can utilize to find an open path for a particular puzzle.
Various programs run on the computer you are trying to escape from. The game includes a disassembler showing you the assembly language corresponding to the machine code that is being executed. Don’t worry if you don’t know any Assembly. There are only a handful of CPU instructions and they are introduced gradually as you complete the puzzles. Reading the assembly code, you can track the program logic, see which parts of RAM it reads and writes to and manipulate data in those locations to get the program to do what you want.
The computer you are trying to escape has a simple CPU with a couple of registers. You can trick the CPU to load yourself into the registers and affect code execution or offload yourself into otherwise unreachable memory locations.
For some puzzles, it isn’t enough to change the data in RAM or registers. You can also change the machine code to get the computer to do different things.
Carefully observe the bytes on the screen and what the CPU is doing. Sometimes you need to read the code in straightforward manner. Sometimes you need to work your way backwards: find the line of the code you want executed and then trace the code backwards to figure out how to trick the CPU to get to that instruction.
The game only has about 30 puzzles, but some of those might take considerable effort to solve. So take it easy and don’t rush to the end. If you solve a puzzle by accident, don’t go forward until you understand why it happened. You might miss some small detail and get completely stuck on the next puzzle.
The game is about the way computers work internally. This isn’t a game about writing new programs, but hacking existing programs and their data to clear the path or teleport across memory until you find a way to escape the computer completely.
Having some programming knowledge makes the game easier, but it isn’t required. All the elements required to solve the puzzles are explained in the game.
A single bit of computer memory became sentient and decided to escape from digital into the real world. Explore RAM, modify bytes and hack machine code and CPU registers to set it free.
You play the game as a single bit of computer memory. You can invade other bytes around you and thus modify their values.
The game features various types of puzzles:
With ability to XOR into adjacent bytes, you can navigate your way through existing data in the memory. The game automatically marks the bytes you cannot go through without getting yourself overwritten and prevents you entering those. Both binary and ASCII views are available, which you can utilize to find an open path for a particular puzzle.
Various programs run on the computer you are trying to escape from. The game includes a disassembler showing you the assembly language corresponding to the machine code that is being executed. Don’t worry if you don’t know any Assembly. There are only a handful of CPU instructions and they are introduced gradually as you complete the puzzles. Reading the assembly code, you can track the program logic, see which parts of RAM it reads and writes to and manipulate data in those locations to get the program to do what you want.
The computer you are trying to escape has a simple CPU with a couple of registers. You can trick the CPU to load yourself into the registers and affect code execution or offload yourself into otherwise unreachable memory locations.
For some puzzles, it isn’t enough to change the data in RAM or registers. You can also change the machine code to get the computer to do different things.
Carefully observe the bytes on the screen and what the CPU is doing. Sometimes you need to read the code in straightforward manner. Sometimes you need to work your way backwards: find the line of the code you want executed and then trace the code backwards to figure out how to trick the CPU to get to that instruction.
The game only has about 30 puzzles, but some of those might take considerable effort to solve. So take it easy and don’t rush to the end. If you solve a puzzle by accident, don’t go forward until you understand why it happened. You might miss some small detail and get completely stuck on the next puzzle.
The game is about the way computers work internally. This isn’t a game about writing new programs, but hacking existing programs and their data to clear the path or teleport across memory until you find a way to escape the computer completely.
Having some programming knowledge makes the game easier, but it isn’t required. All the elements required to solve the puzzles are explained in the game.
You play the game as a single bit of computer memory. You can invade other bytes around you and thus modify their values.
The game features various types of puzzles:
With ability to XOR into adjacent bytes, you can navigate your way through existing data in the memory. The game automatically marks the bytes you cannot go through without getting yourself overwritten and prevents you entering those. Both binary and ASCII views are available, which you can utilize to find an open path for a particular puzzle.
Various programs run on the computer you are trying to escape from. The game includes a disassembler showing you the assembly language corresponding to the machine code that is being executed. Don’t worry if you don’t know any Assembly. There are only a handful of CPU instructions and they are introduced gradually as you complete the puzzles. Reading the assembly code, you can track the program logic, see which parts of RAM it reads and writes to and manipulate data in those locations to get the program to do what you want.
The computer you are trying to escape has a simple CPU with a couple of registers. You can trick the CPU to load yourself into the registers and affect code execution or offload yourself into otherwise unreachable memory locations.
For some puzzles, it isn’t enough to change the data in RAM or registers. You can also change the machine code to get the computer to do different things.
Carefully observe the bytes on the screen and what the CPU is doing. Sometimes you need to read the code in straightforward manner. Sometimes you need to work your way backwards: find the line of the code you want executed and then trace the code backwards to figure out how to trick the CPU to get to that instruction.
The game only has about 30 puzzles, but some of those might take considerable effort to solve. So take it easy and don’t rush to the end. If you solve a puzzle by accident, don’t go forward until you understand why it happened. You might miss some small detail and get completely stuck on the next puzzle.
The game is about the way computers work internally. This isn’t a game about writing new programs, but hacking existing programs and their data to clear the path or teleport across memory until you find a way to escape the computer completely.
Having some programming knowledge makes the game easier, but it isn’t required. All the elements required to solve the puzzles are explained in the game.
Minimum System Requirements | Recommended System Requirements | |
CPU | Core2Duo 1.0 GHz | INTEL Core 2 Duo 2.66 GHz |
VRAM | 512 MB | 1 GB |
RAM | 512 MB RAM | 4 GB |
OS | Windows XP or newer | Windows 7/8/8.1/10 |
Graphics Card | 128MB Video RAM, OpenGL 1.1+ | |
Direct X | 9.0c | 9.0c |
SOUND CARD | DirectX Compatible | DirectX Compatible |
HDD Space | 200 MB available space | 2 GB free |
Game Analysis | The cheapest graphics card you can play it on is an NVIDIA GeForce 6100. You will need at least 150 MB of free disk space to install Prim Rogue. To play Prim Rogue you will need a minimum CPU equivalent to an Intel Core 2 Duo U7600. The minimum memory requirement for Prim Rogue is 1 GB of RAM installed in your computer. Prim Rogue will run on PC system with Windows 7 and upwards. |
Minimum System Requirements | ||
CPU | Core2Duo 1.0 GHz | |
RAM | 512 MB RAM | |
OS | 10.9 Mavericks | |
Graphics Card | 128MB Video RAM, OpenGL 1.1+ | |
HDD Space | 200 MB available space |
Minimum System Requirements | ||
CPU | Core2Duo 1.0 GHz | |
RAM | 512 MB RAM | |
OS | Any 32bit or 64bit | |
Graphics Card | 128MB Video RAM, OpenGL 1.1+ | |
HDD Space | 200 MB available space |
Overview
Platforms
Release Dates
2018-Oct-10 - PC (Microsoft Windows) - Worldwide
Related URL
Developers
Publishers
Game Modes
Game Themes
Languages
BigosaurElliott KrautsPrim Rogue
Rating
Editor Rating
User Rating
Rate Here
Score
6.3
—
6.3
Total Score
—
User Score
You have rated this
What's your reaction?
Very Bad
0%
Bad
0%
Average
0%
Alright
0%
Good
0%
Super
0%
This Game has no review yet, please come back later...
This Game has no news yet, please come back later...
This Game has no walkthrough yet, please come back later...
Comments