KDB
Enables debugging of Linux x86_64 processes through time-travel debugging features including process attachment, breakpoint management, execution control, stack trace analysis, and memory inspection.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@KDBdebug my crashing Rust program with PID 12345"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
🚀 Quick Start (30 seconds)
Option 1: One-Line Setup
npx -p @kindly-software-inc/kdb kdb-configure --autoFollow the prompts to sign in with Google and auto-configure your MCP client.
Option 2: With License Key
npx -p @kindly-software-inc/kdb kdb-configure --auto --license "YOUR-LICENSE-KEY"Option 3: Manual Config
Add to your MCP client config (Claude Code, Cursor, etc.):
{
"mcpServers": {
"kdb": {
"command": "npx",
"args": ["@kindly-software-inc/kdb"]
}
}
}That's it! 🎊 Ask your AI: "Debug my crashing program"
⏱️ What It Does
Time-travel debugging for AI workflows. Step forward. Step backward. Debug as if the bug never existed.
Feature | Description |
⏪ Step Backward | Rewind execution to find root causes |
⏩ Step Forward | Resume from any checkpoint |
🎯 Breakpoints | Hardware-level with hit counting |
📚 Stack Traces | SIMD-accelerated unwinding |
🔐 Audit Trail | Hash-chain integrity for compliance |
💜 How It Works
┌─────────────────┐ MCP ┌─────────────────┐
│ Your Machine │◄────────────►│ Kindly Server │
│ (any OS) │ │ (Linux x86_64) │
│ │ │ │
│ Claude Code │ │ 🔮 Time-Travel │
│ Cursor │ │ 🎯 Breakpoints │
│ Any AI │ │ 📊 Analysis │
└─────────────────┘ └─────────────────┘No local installation. Works on macOS, Windows, Linux via MCP.
🏷️ Pricing
Tier | Price | Sessions |
🆓 Hobby | Free | 5/month (unlimited during 7-day trial!) |
💎 Pro | $19/mo | 100/month + unlimited time-travel |
🔧 Engineer | $49/mo | 500/month + memory replay + LSH bug search |
👥 Teams | $129/mo | 2,000/month + team audit logs |
🏢 Enterprise | Custom | Unlimited + SOX/SOC2/GDPR/HIPAA compliance |
🛠️ MCP Tools
Your AI gets these debugging superpowers:
debugger_attach- Connect to a processdebugger_set_breakpoint- Set breakpointsdebugger_continue- Resume executiondebugger_step_forward- Step forwarddebugger_step_backward- ⏪ Step backward in timedebugger_get_stack_trace- Get stack tracedebugger_get_variables- Read memorydebugger_export_trace- Export execution trace
💬 Example
You: "My Rust program crashes at runtime. PID is 12345"
AI:
I'll attach and debug that for you.
📎 Attached to process 12345
📸 Captured snapshot
🔍 Stack trace shows crash at unwrap() on None in process_data()
The issue is at line 47 in src/main.rs. Here's the fix:
[code suggestion]📞 Support
💬 Discord (coming soon)
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/Kindly-Software/kdb'
If you have feedback or need assistance with the MCP directory API, please join our Discord server