Doom within Doom: this is how this crazy project is

doom in doom

Doom is one of the most successful video games, in both modern and retro versions. In fact, the classic Doom is one of the video games that has produced the most crazy projects. From running it in a predictor, to this one I'm presenting to you today, which has pretended to run Doom within Doom. Utility? I don't know, I don't know in the case of the predictor either, but in any case, they are crazy things that can be done and that are demonstrated with this type of project.

To make this possible, its creator has come up with a curious trick to take advantage of an exploit in the DOS version of Doom II. In this way, with modifications in the code itself, Kgsws achieved a more modern port, Chocolate Doom, which could be executed as an animated texture within several windows of the game itself.

Kgsws has explained that the other versions of Doom lack the necessary exploit to work with this technique, so you won't see this in other versions, though when it comes to Doom you never know what's next.

But it's not just about making 'Doom' work within 'Doom'. What's really interesting is that when you're playing Doom and you come across one of these windows, the player can jump into of any of them where the other Doom is running to continue playing in that other instance. If you want to see all this in action, you can watch the following video in which you can appreciate all this that I have explained and that may seem strange, but it is fun if you think about it:

And yes, since it can be run on DOSBox, which is also available for Linux distros, you can try it on your favorite distro.

More Doom-in-Doom Information – GitHub page

The content of the article adheres to our principles of editorial ethics. To report an error click here!.

Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *



  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.