MCP Catalogs
Home

cheat-engine-server-python

by bethington·49·Score 44

MCP Cheat Engine Server provides safe read-only memory access for debugging and analysis.

developer-toolssecurityother
9
Forks
1
Open issues
4 mo ago
Last commit
2d ago
Indexed

Overview

The MCP Cheat Engine Server is a specialized MCP server that offers structured, read-only access to memory analysis and debugging functionality through the Model Context Protocol. It targets developers, security researchers, and game modders who need to examine program memory without the risks of modification capabilities. The server emphasizes safety with its read-only mode, process whitelist system, and comprehensive operation logging, making it suitable for security-sensitive environments. Despite being Python-based with limited platform support (primarily Windows), it provides a rich set of tools including process enumeration, memory reading, pattern scanning, disassembly, and pointer chain resolution.

Try asking AI

After installing, here are 7 things you can ask your AI assistant:

you:Debugging applications by examining memory contents without modifying them
you:Security research through safe memory analysis of target processes
you:Game modding and understanding game mechanics via memory inspection
you:Educational purposes for learning about computer memory and reverse engineering
you:Can this server modify memory?
you:What processes can I attach to?
you:Why do I need administrator privileges?

When to choose this

Choose this MCP server when you need safe, read-only memory analysis for debugging applications, security research, or game modding without risking system modifications.

When NOT to choose this

Don't choose this if you need to modify memory or if you're working on platforms other than Windows (support is limited on Linux/macOS).

Tools this server exposes

12 tools extracted from the README
  • list_processes

    Get all running processes with their IDs and memory information

  • attach_to_process

    Attach to a specific process by ID for memory analysis

  • detach_from_process

    Safely detach from the currently attached process

  • read_memory_region

    Read memory from a specific address with specified size and data type

  • scan_memory

    Search for byte patterns or text in a memory region

  • disassemble_code

    Disassemble machine code at a specific address into assembly instructions

  • analyze_structure

    Analyze memory structure at a specific address to understand data layout

  • resolve_pointer_chain

    Resolve multi-level pointer chains from a base address with offsets

  • get_memory_regions

    Get the virtual memory layout and regions of the attached process

  • import_cheat_table

    Import a Cheat Engine table (.CT) file for analysis

  • execute_lua_script

    Execute Lua scripts in safe mode for analysis purposes

  • get_process_info

    Get detailed information about the attached process

Comparable tools

mcp-debug-servermemory-inspector-mcpprocess-explorer-mcpcheat-enginewindebug

Installation

Installation

Prerequisites
  • Windows 10/11 (64-bit recommended)
  • Python 3.9 or higher
  • Administrator privileges (for memory access)
  • Claude Desktop or compatible MCP client
Steps
  1. Clone or download the project to your computer
  2. Open PowerShell as Administrator
  3. Navigate to the server directory
  4. Install dependencies: pip install -r requirements.txt
  5. Test the server: python server/main.py --test
  6. Start the server: python server/main.py
Claude Desktop Configuration

Add to your Claude Desktop config file (%APPDATA%\Claude\claude_desktop_config.json):

{
  "mcpServers": {
    "cheat-engine": {
      "command": "python",
      "args": ["path\\to\\server\\main.py", "--debug", "--read-only"],
      "cwd": "path\\to\\cheat-engine-server-python"
    }
  }
}

Restart Claude Desktop after adding the configuration.

FAQ

Can this server modify memory?
No, the MCP Cheat Engine Server operates exclusively in read-only mode. It can read and analyze memory but cannot modify it, ensuring safety and preventing accidental system instability.
What processes can I attach to?
You can only attach to processes that are whitelisted in the `server/config/whitelist.json` file. By default, common applications like Notepad and Calculator are allowed. You can modify this file to add or remove processes as needed.
Why do I need administrator privileges?
Administrator privileges are required for accessing memory across processes in Windows. Without these permissions, the server would be unable to attach to processes or read their memory contents.

Compare cheat-engine-server-python with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.