Distributes the CheatEngine plugin through GitHub and provides repository functionality
Enables memory writing and pointer scanning functionality, though noted as being unstable
Provides a Python-based toolkit for memory analysis and manipulation through the MCP interface
Incorporates Shields.io badges for language selection in the documentation
Utilizes socket protocol for communication between Python and CheatEngine
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@MCP CheatEngine Toolkitread memory at 0x7065F60 as int32 with assembly analysis"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
This server cannot be installed