Distributes the CheatEngine plugin through GitHub and provides repository functionality
Enables memory writing and pointer scanning functionality, though noted as being unstable
Provides a Python-based toolkit for memory analysis and manipulation through the MCP interface
Incorporates Shields.io badges for language selection in the documentation
Utilizes socket protocol for communication between Python and CheatEngine
This server cannot be installed
local-only server
The server can only run on the client's local machine because it depends on local resources.
Python-based toolkit that communicates with CheatEngine through MCP interface, allowing memory reading and assembly code analysis.
Related MCP Servers
- -securityFlicense-qualityAn MCP server that analyzes Python codebases using AST, stores code elements in a vector database, and enables natural language queries about code structure and functionality using RAG with Google's Gemini models.Last updated -5
- -securityAlicense-qualityA lightweight, extensible cybersecurity toolkit that connects AI assistants to security tools through the Model Context Protocol (MCP), enabling AI-assisted security research, scanning, and analysis.Last updated -9MIT License
YepCode MCP Serverofficial
-securityAlicense-qualityAn MCP server that enables AI platforms to interact with YepCode's infrastructure, allowing LLM-generated scripts to run on YepCode and turning YepCode processes into powerful tools that AI assistants can use directly.Last updated -2336MIT License- -securityFlicense-qualityA Python implementation of the MCP server that enables AI models to connect with external tools and data sources through a standardized protocol, supporting tool invocation and resource access via JSON-RPC.Last updated -1