Inside were not textures or models, but twelve audio files and a single image. The image was a photograph—real, not Lego—of a whiteboard in an office. On it, someone had sketched a map of Lego City, with red X’s over certain buildings. Written in marker at the bottom: “Dev build 04 - voice lines that didn’t make sense. Ask script team. 3/14/12.”
He loaded the first audio file. A voice he didn’t recognize—female, tense—said:
Leo’s heart thumped. He tabbed back to the hex editor and searched for any string containing “Rex Fury” or “Auburn.” Nothing. But there was another anomaly: a hidden archive labeled EVIDENCE.LZS —LZS being the game’s native compression format.
He unpacked it.
Leo selected it.
He wasn’t playing a game anymore. He was investigating one.
The file ended.
He loaded the ROM onto real hardware via USB Loader GX. The game booted—no wireframe, no glitches. Just the normal, cheerful title screen.
Most people would have ignored it. Leo was not most people. He was a preservationist—a digital archaeologist who believed every byte told a story. So he loaded the ROM’s file structure into a hex viewer and started scanning.
Leo glanced at his own modded Wii U, sitting on his desk. lego city undercover rom wii u
The screen went black. Then, in plain white text:
“Chase, they’re watching the emulator logs. If you’re reading this from a ROM dump, congratulations. You’ve found the dead drop. The real mission wasn’t Rex Fury. It was the code itself. They tried to wipe the Wii U master branch, but we hid one copy. Find the missing disguise. It’s not in the game. It’s in the room where the game was made.”
He pulled up a map of the actual TT Fusion offices from 2012—archived from a LinkedIn photo. The whiteboard in the evidence photo matched. And in the background, half-covered by a sticky note: a shelf with a single Wii U dev kit, a red sticky label on its side reading: “DO NOT WIPE - CHASE DATA” Inside were not textures or models, but twelve
Leo grinned.