The aim of this project is to use the iv4XR agent to test NetHack and quantify testability using f.e. achieved coverage. A socket connection is required since NLE (which contains NetHack) and iv4XR are programmed in different languages, Python and Java respectively. A socket connection is established between the Python (server) and Java (client) using custom messages in binary.
More details on server and client are mentioned in their README.md files.
This is for a Thesis project at Utrecht University.
The game has configurations that specify information about the socket connection, seed, and other general information.
After starting the client and server as specified in their READMEs the following should be shown:
If the agent entrypoint is used, the map of the agentstate and the HPA* representation is shown:
To have an overview of the possible commands type the command '?':