Integrations
Enables interaction with Cheat Engine's Lua interface through a pipe server, allowing for runtime code analysis, setting comments on memory addresses, and retrieving disassembly information from the currently selected region in CE's disassembler view.
化学药剂学
用于 Cheat Engine 的 MCP 服务器
该项目目前正在开发中。
欢迎提出想法和建议。
迅速的
要求
- 操作系统:Windows
- 工具:uv
成分
工具
- get_ceversion:获取 Cheat Engine 版本
- set_comment:为指定的内存地址设置注释
- get_selected_disassembly:获取 CE 反汇编器视图中当前选定区域的反汇编
快速入门
CE 端
将open_lua_server.lua
文件放在 Cheat Engine 的自动运行文件夹中以启用 Lua 管道服务器:
位置: [Cheat Engine Installation Directory]\autorun\
例如: C:\Program Files\Cheat Engine\autorun\
克劳德桌面
在 MacOS 上: ~/Library/Application\ Support/Claude/claude_desktop_config.json
在 Windows 上: %APPDATA%/Claude/claude_desktop_config.json
Related MCP Servers
- AsecurityAlicenseAqualityMCP Server for automated reverse engineering with IDA Pro.Last updated -221,975PythonMIT License
- AsecurityAlicenseAqualityMCP server for reverse engineering that enables interaction with IDA Pro for analysis tasks such as decompilation, disassembly, and memory engagement reports.Last updated -2428PythonMIT License
- -securityAlicense-qualityAn MCP server that allows LLMs to autonomously reverse engineer applications by exposing Ghidra functionality, enabling decompilation, analysis, and automatic renaming of methods and data.Last updated -4,290Apache 2.0
- -securityAlicense-qualityPython-based toolkit that communicates with CheatEngine through MCP interface, allowing memory reading and assembly code analysis.Last updated -12PythonMIT License