We can only hope the parent comment indeed knows a better source or even what he is talking about. Let give him the benefit of the doubt and assume that the shortness of his comment derives from a lack of time and not from a lack of knowledge.
Pssh, real developers read volumes 1, 3A, 3B, 3C, and 3D of the Intel® 64 and IA-32 Architectures Software Developer’s Manual Combined Volumes, pages 3125 through 4200
And if you have a steady hand, a magnetized needle and a hard drive can be used for practice exercises.
The RISC-V privileged spec describes their paging implementation (under the Supervisor-level ISA), while the unprivileged spec has a chapter and two appendices describing their memory model (RVWMO), formal axiomatic and operational models included.
Finding the inevitable bugs in the formal model is left as an exercise to the reader (three bugs where the axiomatic/operational models disagree are already known).
If you want a more gentle introduction, the Computer Organization and Design book is pretty nice.