The problem consisted in finding how to get into the protected area at the beggining of the memory, in this case we moved ```I``` register with the instruction to print the hex sprites, we noticed that we could move it even further. We started printing the whole memory until 0x200. Noticed that the data after the hex chars were not sprites, but bytes. Decoded the consequent bits as bytes until the end of the flag.

Original writeup (https://github.com/ShingekiNoChikungunya/write-ups/tree/master/HackTM-CTF-2020/CHIP_8_%231).