This project uses LLM-assisted reverse engineering with Ghidra and Ghidra MCP to analyze a DOS game binary. The goal is to progressively recover meaningful program structure by tracing execution from the application entry point, identifying functions, variables, globals, data structures, and subsystem boundaries, and renaming only when there is high confidence.
This repository also maintains an ARCHITECTURE.md file that records confirmed subsystem discoveries and their relationships.
Accuracy matters more than speed. Never guess.