The Church Machine — capability-secured processor architecture for education
Structured courseware aligned to examination boards. Lesson plans, exercises, mark schemes, and exam-style questions mapped to the Church Machine architecture.
EnquireFor embedding in commercial products, proprietary hardware, paid services, or for-profit systems.
ContactStructured learning paths built on the free platform, aligned to specific examination boards:
Computer Science
Coming SoonComputer Science
Coming SoonComputer Science HL/SL
Coming SoonLogic & Computational Thinking
Coming SoonComputer Science
Coming SoonPrinciples & A
Coming SoonCapability-focused instructions:
| CLOAD | Load capability from namespace |
| CSTORE | Store capability to namespace |
| CSEAL | Seal a capability |
| CUNSEAL | Unseal a capability |
| CINVOKE | Invoke a sealed capability |
| CSPLIT | Split capability permissions |
| CMERGE | Merge capabilities |
| CTYPEOF | Get capability type |
| CCHANGE | Domain switch |
| CSWITCH | Thread switch |
Data manipulation instructions:
| LOAD | Load data from memory |
| STORE | Store data to memory |
| ADD | Add registers |
| SUB | Subtract registers |
| AND | Bitwise AND |
| OR | Bitwise OR |
| XOR | Bitwise XOR |
| SHIFT | Shift register |
| CMP | Compare registers |
| BRANCH | Conditional branch |
32-bit unforgeable capability tokens with permission bits and versioned seals:
Permissions: R=Read, W=Write, X=Execute, L=Load, S=Store, E=Entry • B bit: Defaults to 0, auto-cleared by CALL • Domain purity: Strict separation between capabilities (Church) and code/data (DATA)
Clone the full IDE, compiler, and hardware designs. Free for everyone.
GitHub RepositoryLicensing enquiries, curriculum packages, and commercial partnerships.
SIPanticINC@gmail.com