Beyond Castle Wolfenstein

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Beyond Castle Wolfenstein
Beyond Castle Wolfenstein Coverart.jpg
Developer(s)Muse Software
Publisher(s)Muse Software
Designer(s)Eric Ace
Frank Svoboda III
Silas S. Warner[1]
Platform(s)Apple II, Atari 8-bit, Commodore 64, MS-DOS
ReleaseJune 1984
Genre(s)Stealth, shooter

Beyond Castle Wolfenstein is a 1984 World War II stealth game. A direct sequel to Castle Wolfenstein, it is the second game in the Wolfenstein series, and the last installment to be released by original developer Muse Software before the name was revived for a first person shooter in 1991. Castle Wolfenstein was written solely by Silas Warner for the Apple II, while the sequel was developed simultaneously for the Apple II and Commodore 64 by Warner, Eric Ace, and Frank Svoboda III.[1] It was quickly ported to the Atari 8-bit family and MS-DOS.


Like its predecessor, Beyond Castle Wolfenstein is a combination action and adventure game with stealth elements. It is set in World War II during Adolf Hitler's rule as Chancellor of Germany. The objective of the game is to traverse all the levels of the secret Berlin bunker where the Führer is holding secret meetings with his senior staff. The player must retrieve a bomb that the operatives have placed inside the bunker and place it outside the door of the room where Hitler is holding his meeting, a scenario bearing a passing resemblance to the July 20 Plot.

The game features a top-down view of each room on the level, though the characters are seen upright like in a side-scroller. The player tries to traverse the levels by sneaking by, impersonating and sometimes killing opponents. The game is controlled via a joystick, paddles, or the keyboard, although the keyboard is the only option that allows for all commands.[2] The player successfully completes the game after planting the bomb and escaping the bunker before it explodes.

The game is similar to its predecessor, but features a number of gameplay updates. The guards now use a pass system, in which the player is periodically summoned by guards and asked to show the correct pass (which varies by floor), or offer a bribe. If an incorrect pass is shown or the bribe is rejected due to the lack of money (for a total of two times), the guard will attempt to activate a bunker-wide alarm or kill the player.

The bodies of dead guards can be dragged through the room to conceal them, block passages, or gain access to objects.

The highly explosive grenades of the previous game have been replaced with a dagger, which can be used to silently kill guards instead of attracting attention with gunfire.

Additionally, the audio system includes an increased vocabulary and greater variety of sound effects.

Upon successful completion of the game, the player is rewarded with a high resolution graphic of the bunker exploding in the background, with the player running away in the foreground.


Harvey Berstein wrote in a 1985 Antic review: "while there have been some minor improvements, the game play doesn't provide nearly as much depth as the documentation suggests." He criticized the game for having the same Apple II-like graphics as its predecessor and slow loading speed. He also pointed out, "Once you know which passes to use, you can breeze through the game", discouraging replay.[3]

A 1991 Computer Gaming World survey of strategy and war games gave it two stars out of five.[4]


  1. ^ a b Hague, James. "The Giant List of Classic Game Programmers".
  2. ^ Loguidice, Bill; Barton, Matt (21 August 2012). Vintage Games: An Insider Look at the History of Grand Theft Auto, Super Mario, and the Most Influential Games of All Time. CRC Press. ISBN 9781136137587. Retrieved 29 August 2016. CS1 maint: discouraged parameter (link)
  3. ^ Bernstein, Harvey (May 1985). "Beyond Castle Wolfenstein". Antic. p. 83. Retrieved 8 January 2015. CS1 maint: discouraged parameter (link)
  4. ^ Brooks, M. Evan (November 1991). "Computer Strategy and Wargames: The 1900-1950 Epoch / Part I (A-L) of an Annotated Paiktography". Computer Gaming World. p. 138. Retrieved 18 November 2013. CS1 maint: discouraged parameter (link)
  • Ahoy! July 1984.
  • Atari Computer Enthusiasts. March 1985.
  • Personal Software. August 1984.
  • Softalk. July 1984.
  • Video Game Update. July 1984.

External links[edit]