MCP CheatEngine Toolkit

Integrations

  • Distributes the CheatEngine plugin through GitHub and provides repository functionality

  • Enables memory writing and pointer scanning functionality, though noted as being unstable

  • Provides a Python-based toolkit for memory analysis and manipulation through the MCP interface

MCP CheatEngine Cto

MCP CheatEngine unofficial is a Python-based toolkit that communicates with CheatEngine through the MCP interface, providing features such as reading memory and assembly code analysis.

Python and CE use the socket protocol for communication. Currently, the Python MCP only has a built-in read module, and the write module has not been implemented in the MCP client. Lua has also implemented writing and pointer scanning, but it's unstable.

If you're interested, please give it a star.

  • The project is still in its early stages and there are issues and problems

Features

  • Automatically connect to CheatEngine and analyze application memory and assembly
  • Provide AI interactive memory reading functionality
  • Support getting and analyzing assembly code corresponding to memory addresses

Getting Started

  • It is recommended to use the cursor in conjunction with this project to complete the usage

Install Dependencies

pip install -r requirements.txt

Run MCPService

python main.py

Tool Usage Instructions

For detailed information, please refer to the API documentation

1. Connection Tool (ce_connect)

Used to connect to CheatEngine and check the connection status.

ce_connect()

2. Memory Reading (memory_read)

Read data from a specified memory address.

memory_read("0x7065F60", "int32") memory_read("0x7065F60", "int32", { "assembly": True, "assemblySize": 10, "rawBytes": True })

3. Testing Tool (test_echo)

A testing tool that receives input of any type and outputs it unchanged.

# Example test_echo("Test String") test_echo({"name": "Test", "value": 100})
-
security - not tested
A
license - permissive license
-
quality - not tested

local-only server

The server can only run on the client's local machine because it depends on local resources.

Python-based toolkit that communicates with CheatEngine through MCP interface, allowing memory reading and assembly code analysis.

  1. CE Plugin Link
    1. Features
    2. Getting Started
    3. Tool Usage Instructions

Related MCP Servers

  • A
    security
    F
    license
    A
    quality
    An MCP server that enables LLMs to understand and analyze code structure through function call graphs, allowing AI assistants to explore relationships between functions and analyze dependencies in Python repositories.
    Last updated -
    6
    7
    Python
  • -
    security
    F
    license
    -
    quality
    An MCP server that wraps the Riza Code Interpreter API and presents endpoints as individual tools.
    Last updated -
    6
    JavaScript
  • -
    security
    A
    license
    -
    quality
    A Python-based MCP server that allows Claude and other LLMs to execute arbitrary Python code directly through your desktop Claude app, enabling data scientists to connect LLMs to APIs and executable code.
    Last updated -
    23
    MIT License
    • Apple
    • Linux
  • A
    security
    A
    license
    A
    quality
    MCP Server for automated reverse engineering with IDA Pro.
    Last updated -
    22
    1,471
    Python
    MIT License
    • Linux
    • Apple

View all related MCP servers

ID: ldi7vxq0ds