SGDQ 2022: Zelda Beta Cartridge “Triforce% run,” explained

Friday night at SGDQ 2022 the TAS Block show demonstrated something special. After a recording of a Portal 2 run that predictably demolished that game, they moved on to a rather more esoteric show.

In past shows, TAS Bot has some off some pretty ridiculous sights, using something called Arbitrary Code Execution (ACE). Essentially, using certain well-understood exploits, the runner (usually, but not always, a set of scripted inputs) writes a sequence of instructions into the machine’s RAM, and then transfers the code execution to that sequence, allowing for “arbitrary behavior,” meaning, almost anything that can be written into that RAM. TAS Bot at AGDQ 2014 wrote Pong into memory during a run of Super Mario World and ran it (6 minutes):

This technique has also been used to run a variant of Flappy Bird, and even a bona fide hex editor into the save RAM of Super Mario World, without even needing scripts, entirely by a human player. But this is beside the point.

In 2017, TASbot demolished the NES Classic, NES games and pulled off other very weird shenanigans (59 minutes).

There’s several of these videos, which I leave it to you to search out. They’re pretty easy to find on YouTube with the search terms “games done quick” and “tasbot”.

The point of this post is to bring you news of how players finally “obtained” the Triforce in Ocarina of Time after 23 years. The video of the show has yet to be uploaded to YouTube (it has been since I wrote this! scroll to the end), but until it shows up, Retro Game Mechanics EX has a video explaining how it was done (34 minutes):

SwankyBox has his own explainer video that’s 22 minutes. Of course, it’s all an elaborate show, but it runs on the Ocarina of Time beta cartridge found back in January of last year.


EDIT: Here it is, the whole 1-hour 13-minute epic!