GPL 3.0
Integrations
  • Enables interaction with Cheat Engine's Lua interface through a pipe server, allowing for runtime code analysis, setting comments on memory addresses, and retrieving disassembly information from the currently selected region in CE's disassembler view.

cemcp

MCP Server for Cheat Engine

This project is currently under development.
Ideas and suggestions are welcome.

prompt

Analyze the selected range and add detailed explanations (not just at the beginning but at key points throughout for clarity: describe function details at the function entry point)

Requirements

  • OS:Windows
  • Tool:uv

Components

Tools

  • get_ceversion: Get the Cheat Engine version
  • set_comment: Set a comment for a specified memory address
  • get_selected_disassembly: Get the disassembly of the currently selected region in CE's disassembler view

Quickstart

CE side

Place open_lua_server.lua file in Cheat Engine's autorun folder to enable the Lua pipe server:

Location: [Cheat Engine Installation Directory]\autorun\
Example: C:\Program Files\Cheat Engine\autorun\

Claude Desktop

On MacOS: ~/Library/Application\ Support/Claude/claude_desktop_config.json
On Windows: %APPDATA%/Claude/claude_desktop_config.json

"mcpServers": { "cemcp": { "command": "uv", "args": [ "--directory", "\path\to\cemcp", "run", "cemcp" ] } }
-
security - not tested
A
license - permissive license
-
quality - not tested

An MCP server for Cheat Engine that provides functionality to analyze disassembly, get CE version information, and manipulate memory addresses with comments through Claude AI.

  1. Requirements
    1. Components
      1. Tools
    2. Quickstart
      1. CE side
      2. Claude Desktop

    Related MCP Servers

    • A
      security
      A
      license
      A
      quality
      MCP Server for automated reverse engineering with IDA Pro.
      Last updated -
      22
      1,975
      Python
      MIT License
      • Linux
      • Apple
    • A
      security
      A
      license
      A
      quality
      MCP server for reverse engineering that enables interaction with IDA Pro for analysis tasks such as decompilation, disassembly, and memory engagement reports.
      Last updated -
      24
      28
      Python
      MIT License
    • -
      security
      A
      license
      -
      quality
      An MCP server that allows LLMs to autonomously reverse engineer applications by exposing Ghidra functionality, enabling decompilation, analysis, and automatic renaming of methods and data.
      Last updated -
      4,290
      Apache 2.0
      • Apple
    • -
      security
      A
      license
      -
      quality
      Python-based toolkit that communicates with CheatEngine through MCP interface, allowing memory reading and assembly code analysis.
      Last updated -
      12
      Python
      MIT License

    View all related MCP servers

    MCP directory API

    We provide all the information about MCP servers via our MCP API.

    curl -X GET 'https://glama.ai/api/mcp/v1/servers/DoranekoSystems/cemcp'

    If you have feedback or need assistance with the MCP directory API, please join our Discord server