cemcp
MCP Server for Cheat Engine
This project is currently under development.
Ideas and suggestions are welcome.
prompt
Requirements
- OS
- Tool
Components
Tools
- get_ceversion: Get the Cheat Engine version
- set_comment: Set a comment for a specified memory address
- get_selected_disassembly: Get the disassembly of the currently selected region in CE's disassembler view
Quickstart
CE side
Place open_lua_server.lua
file in Cheat Engine's autorun folder to enable the Lua pipe server:
Location: [Cheat Engine Installation Directory]\autorun\
Example: C:\Program Files\Cheat Engine\autorun\
Claude Desktop
On MacOS: ~/Library/Application\ Support/Claude/claude_desktop_config.json
On Windows: %APPDATA%/Claude/claude_desktop_config.json
This server cannot be installed
Claude AI를 통해 디스어셈블리를 분석하고, CE 버전 정보를 얻고, 주석으로 메모리 주소를 조작하는 기능을 제공하는 Cheat Engine용 MCP 서버입니다.
Related MCP Servers
- AsecurityAlicenseAqualityMCP Server for automated reverse engineering with IDA Pro.Last updated -433,134PythonMIT License
- AsecurityAlicenseAqualityMCP server for reverse engineering that enables interaction with IDA Pro for analysis tasks such as decompilation, disassembly, and memory engagement reports.Last updated -2442PythonMIT License
- -securityAlicense-qualityAn MCP server that allows LLMs to autonomously reverse engineer applications by exposing Ghidra functionality, enabling decompilation, analysis, and automatic renaming of methods and data.Last updated -5,575Apache 2.0
- -securityAlicense-qualityPython-based toolkit that communicates with CheatEngine through MCP interface, allowing memory reading and assembly code analysis.Last updated -22PythonMIT License