Skip to main content
Glama

MCP CheatEngine Toolkit

by Lyoneos

MCP CheatEngine Cto

MCP CheatEngine unofficial is a Python-based toolkit that communicates with CheatEngine through the MCP interface, providing features such as reading memory and assembly code analysis.

Python and CE use the socket protocol for communication. Currently, the Python MCP only has a built-in read module, and the write module has not been implemented in the MCP client. Lua has also implemented writing and pointer scanning, but it's unstable.

If you're interested, please give it a star.

  • The project is still in its early stages and there are issues and problems

Features

  • Automatically connect to CheatEngine and analyze application memory and assembly
  • Provide AI interactive memory reading functionality
  • Support getting and analyzing assembly code corresponding to memory addresses

Getting Started

  • It is recommended to use the cursor in conjunction with this project to complete the usage

Install Dependencies

pip install -r requirements.txt

Run MCPService

python main.py

Tool Usage Instructions

For detailed information, please refer to the API documentation

1. Connection Tool (ce_connect)

Used to connect to CheatEngine and check the connection status.

ce_connect()

2. Memory Reading (memory_read)

Read data from a specified memory address.

memory_read("0x7065F60", "int32") memory_read("0x7065F60", "int32", { "assembly": True, "assemblySize": 10, "rawBytes": True })

3. Testing Tool (test_echo)

A testing tool that receives input of any type and outputs it unchanged.

# Example test_echo("Test String") test_echo({"name": "Test", "value": 100})

UpDate

2025.05.05

  • I recently discovered that Python is able to read memory directly, and this project may be deprecated and discontinued at any time due to the complexity of the code. Future code will probably just leave reading the memory to Python alone.This is because I didn't think about whether Python had a module that could do it at the beginning of the code design process.
-
security - not tested
A
license - permissive license
-
quality - not tested

local-only server

The server can only run on the client's local machine because it depends on local resources.

Python-based toolkit that communicates with CheatEngine through MCP interface, allowing memory reading and assembly code analysis.

  1. CE Plugin Link
    1. Features
    2. Getting Started
    3. Tool Usage Instructions
  2. UpDate
    1. 2025.05.05

Related MCP Servers

  • A
    security
    F
    license
    A
    quality
    An MCP server that enables LLMs to understand and analyze code structure through function call graphs, allowing AI assistants to explore relationships between functions and analyze dependencies in Python repositories.
    Last updated -
    6
    7
    Python
  • -
    security
    F
    license
    -
    quality
    An MCP server that wraps the Riza Code Interpreter API and presents endpoints as individual tools.
    Last updated -
    6
    JavaScript
  • -
    security
    A
    license
    -
    quality
    A Python-based MCP server that allows Claude and other LLMs to execute arbitrary Python code directly through your desktop Claude app, enabling data scientists to connect LLMs to APIs and executable code.
    Last updated -
    23
    MIT License
    • Apple
    • Linux
  • A
    security
    A
    license
    A
    quality
    MCP Server for automated reverse engineering with IDA Pro.
    Last updated -
    22
    1,975
    Python
    MIT License
    • Linux
    • Apple

View all related MCP servers

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Lyoneos/mcp-cheatengine-Cto'

If you have feedback or need assistance with the MCP directory API, please join our Discord server