Feeds
70%
Resident Evil 6

Resident Evil 6 game review

It's bite night tonight in a horrorfest sporting an impressive engine

  • alert
  • submit to reddit

High performance access to file storage

Dead legs

It was Einstein who famously quipped that insanity is ‘doing the same thing, over and over again, but expecting different results,' and it's an observation Capcom really should have heeded.

Resident Evil 6

Paneful sight

In RE6 you will roundhouse kick zombies into oblivion, partake in needless QTEs (and how), collect green herbs and, as is seemingly par for the course now, most of us won't have a clue what's going on thanks to characters who seem incapable of finishing sentences.

And what a lot of characters there are too, because rather than focus on one or two protagonists RE6 throws returning leads Leon S. Kennedy, Chris Redfield and Ada Wong all into the mix, while introducing a host of newbies across its lengthy and interlinked episodes. All characters, with the exception of Ada, have co-op play partners and when campaigns do intertwine, there’s even the option to buddy-up for four-player action.

Resident Evil 6

Bricking it

Presumably the idea of throwing all this content at us (and you’re looking at 40+ hours) is for Capcom to cater to all tastes but, to roll out an overused cliché, it ends up as something of a Jack-of-all-trades.

Despite the impressive engine – which can throw swarms of zombies at you while simultaneously setting off a cacophony of explosions – the experience is more akin to that of an old hat corridor shooter than anything progressive. Indeed, I've been playing Dishonored alongside RE6 and, though clearly very different games, the sheer gulf in ambition between each title is almost laughable.

Resident Evil 6

Killer bites

The fact too that QTEs are sudden and of the kind that require lightning fast reflexes means you'll be unavoidably insta-deathed at times – surely by now a development no-no? Boss fights meanwhile will go on... and on... forever. That’s not to say that such encounters aren’t stunning, but with one such fight in Leon’s campaign lasting for something approaching three hours, they’re a bit much. Indeed, I'm still not convinced it's really dead.

High performance access to file storage

Next page: Chomping at the bit

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.