Skip to main content
Glama

MCP CheatEngine Toolkit

by Lyoneos

MCP CheatEngine Cto

MCP CheatEngine unofficial is a Python-based toolkit that communicates with CheatEngine through the MCP interface, providing features such as reading memory and assembly code analysis.

Python and CE use the socket protocol for communication. Currently, the Python MCP only has a built-in read module, and the write module has not been implemented in the MCP client. Lua has also implemented writing and pointer scanning, but it's unstable.

If you're interested, please give it a star.

  • The project is still in its early stages and there are issues and problems

Features

  • Automatically connect to CheatEngine and analyze application memory and assembly
  • Provide AI interactive memory reading functionality
  • Support getting and analyzing assembly code corresponding to memory addresses

Getting Started

  • It is recommended to use the cursor in conjunction with this project to complete the usage

Install Dependencies

pip install -r requirements.txt

Run MCPService

python main.py

Tool Usage Instructions

For detailed information, please refer to the API documentation

1. Connection Tool (ce_connect)

Used to connect to CheatEngine and check the connection status.

ce_connect()

2. Memory Reading (memory_read)

Read data from a specified memory address.

memory_read("0x7065F60", "int32") memory_read("0x7065F60", "int32", { "assembly": True, "assemblySize": 10, "rawBytes": True })

3. Testing Tool (test_echo)

A testing tool that receives input of any type and outputs it unchanged.

# Example test_echo("Test String") test_echo({"name": "Test", "value": 100})

UpDate

2025.05.05

  • I recently discovered that Python is able to read memory directly, and this project may be deprecated and discontinued at any time due to the complexity of the code. Future code will probably just leave reading the memory to Python alone.This is because I didn't think about whether Python had a module that could do it at the beginning of the code design process.
-
security - not tested
A
license - permissive license
-
quality - not tested

local-only server

The server can only run on the client's local machine because it depends on local resources.

Python-based toolkit that communicates with CheatEngine through MCP interface, allowing memory reading and assembly code analysis.

  1. CE Plugin Link
    1. Features
    2. Getting Started
    3. Tool Usage Instructions
  2. UpDate
    1. 2025.05.05

Related MCP Servers

  • -
    security
    F
    license
    -
    quality
    An MCP server that analyzes Python codebases using AST, stores code elements in a vector database, and enables natural language queries about code structure and functionality using RAG with Google's Gemini models.
    Last updated -
    4
    Python
  • -
    security
    A
    license
    -
    quality
    A lightweight, extensible cybersecurity toolkit that connects AI assistants to security tools through the Model Context Protocol (MCP), enabling AI-assisted security research, scanning, and analysis.
    Last updated -
    7
    Python
    MIT License
  • -
    security
    A
    license
    -
    quality
    An MCP server that enables AI platforms to interact with YepCode's infrastructure, allowing LLM-generated scripts to run on YepCode and turning YepCode processes into powerful tools that AI assistants can use directly.
    Last updated -
    19
    27
    TypeScript
    MIT License
    • Linux
    • Apple
  • -
    security
    F
    license
    -
    quality
    A Python implementation of the MCP server that enables AI models to connect with external tools and data sources through a standardized protocol, supporting tool invocation and resource access via JSON-RPC.
    Last updated -
    1
    Python

View all related MCP servers

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Lyoneos/mcp-cheatengine-Cto'

If you have feedback or need assistance with the MCP directory API, please join our Discord server