A simple SDK to get your hands dirty with Nabaztag
C C++ Ruby JavaScript HTML Makefile Shell
Latest commit bc35c8f Sep 24, 2016 @rngtng committed on GitHub Updated mirror sources


Nabaztag Hack Kit

Everything you need to hack the Rabbit: a sinatra server including simple api framework to run custom bytecode on Nabaztag v1/v2. Includes original compiler sources for linux and a modified mac os x version.

Getting Started


The Hack Kit is distributed as a ruby gem. It comes with a simple web server (based on sinatra) which runs out-of-the for connecting you rabbit and distributing the nabaztag bytecode. In addition it includes sinatra helpers/modules to communicate with the rabbit easily. Lastly it provides binaries to compile your own Nabaztag bytecode (see Binaries below).

Simple Server

The Server is the communication endpoint for the rabbit. Its two main purposes are:

  1. serving the bytecode on bootup
  2. receive and respond to HTTP requests in a defined format.


  1. Install dependencies first:
gem install nabaztag_hack_kit

or if you have a Gemfile

bundle install --path=vendor/bundle
  1. Then, create a config.ru file
require 'nabaztag_hack_kit/server'

run NabaztagHackKit::Server.new
  1. Finally, to start and run the server, execute:
bundle exec rackup -p <portnumer>

See examples/ folder for more sophisticated usage.


The kit comes with violet sources and binaries to compile custom Nabaztag bytecode. See folder compiler/. The linux sources are (more or less) the original ones by violet, the mac osx version was created by @ztalbot2000. The compiler binaries are compiled on installation of the gem.

Following three binaries are available:


A wrapper around mtl_comp. Compiles a *.mtl file. It calls mtl_merge before


A wrapper around mtl_simu. Runs a *.mtl file. It calls mtl_merge before


Merges multiple *.mtl files into one. Files are included like in C: #include "<relative path to file>". Output is temporary file .tmp.mtl.

Understanding the Bytecode

The bytecode is written in a custom language by Sylvain Huet. It is referenced as Metal and files end with .mtl. Unfortunately documentation is very poor (and in french). Check directory ext/bytecode/ which contains a basic overview & documentaion as well as a list of (common) commands. A good reference is the original bytecode, included in the directory as well. Major parts got extracted into seperate files, found in lib/ directory and ready to be included in your code.


The kit includes a simple test framework to test custom bytecode. See test/bytecode/test.mtl. A typical test looks like this:

 let test "<test name>" -> t in
    assert_equalI 0   10 - (2* 5);

The framework offers assertions similar to Ruby Test::Unit style. Mind that the variable type has to be given explicit. Convention is:

  • I = interger
  • S = string
  • L = list
  • T = tab

Following assertions are available:

  • assert_equalI I I
  • assert_equalI S S
  • assert_nil I
  • assert_equalIL
  • assert_equalSL
  • assert_equalTL


As example and for my own purposes I implemented a simple API to deal with RFID, LEDS, BUTTON and EARS easily.

Input Devices




Current Button has very basic functionality: a short press send HTTP Request of type Log to server, a long press foreces the bunny to restart.

Output Devices

Data for all output devices are stored in buffers. Each device has two: one for ontime, imediate playback, another for permanet loops.


Buffers 0 - 9, where 0-4 are used for onetime, and 5-9 for loop playback.


Buffers 10 - 13, where 10 & 11 are used for onetime, and 12 & 13 for loop playback.


The server part was heavily inspired by Trudy.rb, compiler code copied from OpenJabNab. Thanks!


A good introduction to understand Nabaztag Protocol:

Nabaztag Background

Read following posting for more background on Nabaztag Hacking (uses google translate:)


I'd like to hack the Violet mir:ror too. Some starting points: