Enables interaction with Cheat Engine's Lua interface through a pipe server, allowing for runtime code analysis, setting comments on memory addresses, and retrieving disassembly information from the currently selected region in CE's disassembler view.
cemcp
MCP Server for Cheat Engine
This project is currently under development.
Ideas and suggestions are welcome.
prompt
Requirements
- OS:Windows
- Tool:uv
Components
Tools
- get_ceversion: Get the Cheat Engine version
- set_comment: Set a comment for a specified memory address
- get_selected_disassembly: Get the disassembly of the currently selected region in CE's disassembler view
Quickstart
CE side
Place open_lua_server.lua
file in Cheat Engine's autorun folder to enable the Lua pipe server:
Location: [Cheat Engine Installation Directory]\autorun\
Example: C:\Program Files\Cheat Engine\autorun\
Claude Desktop
On MacOS: ~/Library/Application\ Support/Claude/claude_desktop_config.json
On Windows: %APPDATA%/Claude/claude_desktop_config.json
This server cannot be installed
An MCP server for Cheat Engine that provides functionality to analyze disassembly, get CE version information, and manipulate memory addresses with comments through Claude AI.
Related MCP Servers
- AsecurityAlicenseAqualityMCP Server for automated reverse engineering with IDA Pro.Last updated -221,975PythonMIT License
- AsecurityAlicenseAqualityMCP server for reverse engineering that enables interaction with IDA Pro for analysis tasks such as decompilation, disassembly, and memory engagement reports.Last updated -2428PythonMIT License
- -securityAlicense-qualityAn MCP server that allows LLMs to autonomously reverse engineer applications by exposing Ghidra functionality, enabling decompilation, analysis, and automatic renaming of methods and data.Last updated -4,290Apache 2.0
- -securityAlicense-qualityPython-based toolkit that communicates with CheatEngine through MCP interface, allowing memory reading and assembly code analysis.Last updated -12PythonMIT License