This is a great little collection of classic Namco games - Pac-Man, Rally X, Dig Dug, Mappy, Galaga and Xevious. Not only are the original games faithfully recreated, there’s an ‘arranged’ mode for each with new graphics, music and gameplay. Oh, and there are bunches of debug tools leftover…
disassemblies・digital archaeology・data preservation
Articles with tag `hidden credits`
Phantasm is a creative take on platform shooters, where as a ghost you can posess the bodies of enemies on screen as your person avatar. It’s a well-made game, definitely ‘hidden gem’ status. It also has a very nice selection of debugging tools!
Normally I’d save this to post on a rainy day, but I was so amused when I saw it that I really wanted to share it right away: it looks like those wacky 3DO firmware devs left some messages for us to find!
I seem to be running into this a lot lately, where standard test mode options are disabled or missing from test menus. Honestly, while it’s always gratifying to dig out unused code and make it dance, these finds are kind of boring. But at least this game has some hidden developer credits. Those are always interesting!
Still hacking around with MAME games, and I’m having a blast! This time I opened up Ojanko Yakata (roughly translated as Mahjong Girl Mansion), one of the many, many adult mahjong games to grace game centers of the past. I spotted some ASCII in the memory dump that looked like a hidden developer credits screen and investigated…
There’s a request on mamecheat for Pocket Gal Deluxe, and I figured I’d give it a go. I played around for a bit, then discovered a nice, juicy string table with some intriguing bits of text. After a few hours of working backwards through the disassembly, I discovered a number of interesting tidbits in the data!
This is a fascinating older post made by the NYC Resistor group detailing the technical data behind the images left behind in the Apple Mac SE ROM<. As the ROM only used 89kB of the available 256kB, the original development digitized pictures of themselves and hid them away in the remaining space. The article goes into some interesting details about the image format and CPU opcodes.
Damian Ward has also posted some nice shots of the images on hardware: here, here, here and here.