Skip to main content
Glama

memtool

Analyze and modify process memory for reverse engineering and game hacking. Search, filter, read, write, and disassemble memory values to identify and manipulate data in running applications.

Instructions

Process memory tool for reverse engineering and game hacking. CheatEngine-style workflow: search → filter → filter → find exact addresses → write. Supported: Windows (ReadProcessMemory/WriteProcessMemory), Linux (/proc/pid/mem). macOS: not supported (SIP). Operations: regions (list memory map), search (value scan or unknown initial value scan, creates session), filter (narrow: exact/changed/unchanged/increased/decreased), undo (restore previous filter), read (hex dump), write (modify memory), disasm (disassemble live memory — x86/x64/ARM/ARM64), info (session status + values), close (end session), struct_search (multi-field pattern), pointer_scan (find pointer chains to address), diff (compare memory snapshots).

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
operationYesOperation: regions, search, filter, read, write, disasm, info, close, undo, struct_search, pointer_scan, diff,required
pidNoTarget process ID (for regions, search, read, write, disasm, struct_search, pointer_scan, diff)
session_idNoSession ID from a previous search (for filter, info, close, undo, diff)
value_typeNoValue type: int8/16/32/64, uint8/16/32/64, float32/64, string, utf16, bytes
valueNoSearch/write value (number for numeric types, text for string/utf16, hex bytes like '4D 5A 90' for bytes). Omit for unknown initial value scan.
endianNoByte order: little (default) or big
filter_typeNoFilter: exact, changed, unchanged, increased, decreased
addressNoHex address (e.g. '0x7FF6A1B20000') for read/write/disasm/pointer_scan
lengthNoBytes to read/disasm (default 256 for read, 64 for disasm, max 4096)
protectionNoFilter by protection: r, rw, rx
max_resultsNoMax results to display (default 100, max 1000)
struct_patternNoJSON array for struct search: [{offset:0,type:'int32',value:'100'},{offset:4,type:'int32',value:'50'}]
max_depthNoPointer scan max chain depth (default 3, max 5)
max_offsetNoPointer scan max offset from target (default 0x1000)
archNoCPU architecture for disasm: x86 (default) or arm
modeNoCPU mode for disasm: 32 or 64 (default)
countNoNumber of instructions to disassemble (default 50, max 200)

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/knewstimek/agent-tool'

If you have feedback or need assistance with the MCP directory API, please join our Discord server