Enables debugging of Linux x86_64 processes through time-travel debugging features including process attachment, breakpoint management, execution control, stack trace analysis, and memory inspection.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@KDBdebug my crashing Rust program with PID 12345"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
🚀 Quick Start (30 seconds)
Option 1: One-Line Setup
Follow the prompts to sign in with Google and auto-configure your MCP client.
Option 2: With License Key
Option 3: Manual Config
Add to your MCP client config (Claude Code, Cursor, etc.):
That's it! 🎊 Ask your AI: "Debug my crashing program"
⏱️ What It Does
Time-travel debugging for AI workflows. Step forward. Step backward. Debug as if the bug never existed.
Feature | Description |
⏪ Step Backward | Rewind execution to find root causes |
⏩ Step Forward | Resume from any checkpoint |
🎯 Breakpoints | Hardware-level with hit counting |
📚 Stack Traces | SIMD-accelerated unwinding |
🔐 Audit Trail | Hash-chain integrity for compliance |
💜 How It Works
No local installation. Works on macOS, Windows, Linux via MCP.
🏷️ Pricing
Tier | Price | Sessions |
🆓 Hobby | Free | 5/month (unlimited during 7-day trial!) |
💎 Pro | $19/mo | 100/month + unlimited time-travel |
🔧 Engineer | $49/mo | 500/month + memory replay + LSH bug search |
👥 Teams | $129/mo | 2,000/month + team audit logs |
🏢 Enterprise | Custom | Unlimited + SOX/SOC2/GDPR/HIPAA compliance |
🛠️ MCP Tools
Your AI gets these debugging superpowers:
debugger_attach- Connect to a processdebugger_set_breakpoint- Set breakpointsdebugger_continue- Resume executiondebugger_step_forward- Step forwarddebugger_step_backward- ⏪ Step backward in timedebugger_get_stack_trace- Get stack tracedebugger_get_variables- Read memorydebugger_export_trace- Export execution trace
💬 Example
You: "My Rust program crashes at runtime. PID is 12345"
AI:
📞 Support
💬 Discord (coming soon)