Enables memory scanning, value modification, function hooking, and code injection in Android applications via frida-server.
Enables memory scanning, value modification, function hooking, and code injection in iOS applications via frida-server on jailbroken devices.
Provides Cheat Engine-like capabilities for memory editing, pattern scanning, function hooking, and runtime analysis of Linux processes.
Provides Cheat Engine-like capabilities for memory editing, pattern scanning, function hooking, and runtime analysis of macOS processes.
Frida Game Hacking MCP
A Model Context Protocol (MCP) server that provides Cheat Engine-like capabilities for game hacking through Frida. Enables AI assistants and automation tools to perform memory scanning, value modification, pattern matching, function hooking, and code injection.
Features
Memory Operations (Cheat Engine Style)
Value Scanning: Find values in memory by type (int8-64, float, double, string)
Scan Refinement: Narrow results with
scan_next,scan_changed,scan_unchangedPattern Scanning: Array of Bytes (AoB) with wildcard support (
??)Memory Read/Write: Read and modify memory with type awareness
Function Hooking & Code Injection
Intercept Functions: Hook with
onEnter/onLeaveJavaScript callbacksReplace Functions: Make functions return custom values
Module Hooking: Hook by
module!functionnameSymbol Resolution: Resolve exports to addresses
Process Management
Process Enumeration: List and filter running processes
Attach/Detach: Connect to running processes
Spawn & Resume: Start processes suspended for early hooking
Debugging
Breakpoints: Software breakpoints via hooks
Register Access: Read CPU registers at breakpoints
Module Analysis: List modules, exports, imports
Window Interaction (Windows)
Screenshot Capture: Take screenshots of game windows
Keyboard Input: Send keystrokes to game windows
Window Management: List, focus, and interact with windows
Installation
Requirements
Python 3.10+
Frida 16.0+
pywin32, pillow (Windows, for screenshot features)
Quick Start
Run the MCP Server
Configure with Claude Desktop
Add to your claude_desktop_config.json:
Configure with Other MCP Clients
The server uses stdio transport by default. Connect using:
Command:
python -m frida_game_hacking_mcpTransport: stdio
Usage Examples
Cheat Engine Workflow: Find and Modify Health
Array of Bytes Pattern Scanning
Function Hooking
Early Hooking (Spawn Suspended)
Available Tools (42 Total)
Process Management (6)
Tool | Description |
| Enumerate running processes |
| Attach to process by name or PID |
| Detach from current process |
| Start process suspended |
| Resume spawned process |
| Get current session status |
Memory Operations (10)
Tool | Description |
| Read bytes at address |
| Write bytes/values to address |
| Initial scan for exact value |
| Narrow scan with new value |
| Find changed values |
| Find unchanged values |
| AoB pattern scan with wildcards |
| Get current scan results |
| Reset scan state |
| List memory regions |
Module Information (5)
Tool | Description |
| List loaded modules/DLLs |
| Get module details |
| List module exports |
| List module imports |
| Resolve symbol to address |
Function Hooking (6)
Tool | Description |
| Hook with callbacks |
| Remove hook |
| Replace function return |
| Hook with calling convention |
| List active hooks |
| Hook by module!function |
Debugging (4)
Tool | Description |
| Set software breakpoint |
| Remove breakpoint |
| List breakpoints |
| Read CPU registers |
Script Management (3)
Tool | Description |
| Load custom Frida JS |
| Unload script |
| Call script RPC export |
Window Interaction (5) - Windows Only
Tool | Description |
| Enumerate visible windows |
| Capture window to PNG/base64 |
| Capture screen or region |
| Send keystrokes to window |
| Bring window to foreground |
Standard MCP (3)
Tool | Description |
| List all tools |
| Get help and examples |
| Verify Frida installed |
Value Types
Type | Size | Description |
| 1 byte | Signed byte |
| 1 byte | Unsigned byte |
| 2 bytes | Signed short |
| 2 bytes | Unsigned short |
| 4 bytes | Signed int (most common) |
| 4 bytes | Unsigned int |
| 8 bytes | Signed long |
| 8 bytes | Unsigned long |
| 4 bytes | Single precision |
| 8 bytes | Double precision |
| Variable | Null-terminated string |
Scan Regions
Region | Description |
| Read-write data (heap, stack, globals) - default for value scans |
| Executable code - default for pattern scans |
| Read-write-execute (rare, often exploitable) |
| Read-only data |
Platform Support
Windows: Native support
Linux: Native support
macOS: Native support
Android: Via frida-server
iOS: Via frida-server (jailbroken)
Use Cases
Game Hacking: Memory editing, value modification, trainer development
Security Research: Vulnerability analysis, exploit development
Reverse Engineering: Runtime analysis, API hooking
Software Testing: Fault injection, behavior modification
Malware Analysis: Dynamic analysis in sandboxed environments
Security Notice
This tool is intended for:
Educational purposes
Security research on software you own or have permission to test
Game modding in single-player/offline contexts
Do not use for:
Cheating in online multiplayer games
Circumventing software protections illegally
Any malicious purposes
Contributing
Contributions welcome! Please:
Fork the repository
Create a feature branch
Submit a pull request
License
MIT License - see LICENSE
Credits
Built on Frida by Ole Andre Vadla Ravnas
MCP protocol by Anthropic
Inspired by Cheat Engine by Dark Byte
Links
Built for AI-assisted game hacking and security research.