You play the game as a single bit of computer memory. You can invade other bytes around you and thus modify their values.
The game features various types of puzzles:
With ability to XOR into adjacent bytes, you can navigate your way through existing data in the memory. The game automatically marks the bytes you cannot go through without getting yourself overwritten and prevents you entering those. Both binary and ASCII views are available, which you can utilize to find an open path for a particular puzzle.
Various programs run on the computer you are trying to escape from. The game includes a disassembler showing you the assembly language corresponding to the machine code that is being executed. Don't worry if you don't know any Assembly. There are only a handful of CPU instructions and they are introduced gradually as you complete the puzzles. Reading the assembly code, you can track the program logic, see which parts of RAM it reads and writes to and manipulate data in those locations to get the program to do what you want.
Invade CPU registers
The computer you are trying to escape has a simple CPU with a couple of registers. You can trick the CPU to load yourself into the registers and affect code execution or offload yourself into otherwise unreachable memory locations.
For some puzzles, it isn't enough to change the data in RAM or registers. You can also change the machine code to get the computer to do different things.
The game is about the way computers work internally. This isn't a game about writing new programs, but hacking existing programs and their data to clear the path or teleport across memory until you find a way to escape the computer completely.
Having some programming knowledge makes the game easier, but it isn't required. All the elements required to solve the puzzles are explained in the game.
Windows XP or newer
Core2Duo 1.0 GHz
512 MB RAM
128MB Video RAM, OpenGL 1.1+
200 MB available space