cheat-engine-server-python
by bethington·★ 49·Score 44
MCP Cheat Engine Server provides safe read-only memory access for debugging and analysis.
Overview
The MCP Cheat Engine Server is a specialized MCP server that offers structured, read-only access to memory analysis and debugging functionality through the Model Context Protocol. It targets developers, security researchers, and game modders who need to examine program memory without the risks of modification capabilities. The server emphasizes safety with its read-only mode, process whitelist system, and comprehensive operation logging, making it suitable for security-sensitive environments. Despite being Python-based with limited platform support (primarily Windows), it provides a rich set of tools including process enumeration, memory reading, pattern scanning, disassembly, and pointer chain resolution.
Try asking AI
After installing, here are 7 things you can ask your AI assistant:
When to choose this
Choose this MCP server when you need safe, read-only memory analysis for debugging applications, security research, or game modding without risking system modifications.
When NOT to choose this
Don't choose this if you need to modify memory or if you're working on platforms other than Windows (support is limited on Linux/macOS).
Tools this server exposes
12 tools extracted from the READMElist_processesGet all running processes with their IDs and memory information
attach_to_processAttach to a specific process by ID for memory analysis
detach_from_processSafely detach from the currently attached process
read_memory_regionRead memory from a specific address with specified size and data type
scan_memorySearch for byte patterns or text in a memory region
disassemble_codeDisassemble machine code at a specific address into assembly instructions
analyze_structureAnalyze memory structure at a specific address to understand data layout
resolve_pointer_chainResolve multi-level pointer chains from a base address with offsets
get_memory_regionsGet the virtual memory layout and regions of the attached process
import_cheat_tableImport a Cheat Engine table (.CT) file for analysis
execute_lua_scriptExecute Lua scripts in safe mode for analysis purposes
get_process_infoGet detailed information about the attached process
Comparable tools
Installation
Installation
Prerequisites
- Windows 10/11 (64-bit recommended)
- Python 3.9 or higher
- Administrator privileges (for memory access)
- Claude Desktop or compatible MCP client
Steps
- Clone or download the project to your computer
- Open PowerShell as Administrator
- Navigate to the server directory
- Install dependencies:
pip install -r requirements.txt - Test the server:
python server/main.py --test - Start the server:
python server/main.py
Claude Desktop Configuration
Add to your Claude Desktop config file (%APPDATA%\Claude\claude_desktop_config.json):
{
"mcpServers": {
"cheat-engine": {
"command": "python",
"args": ["path\\to\\server\\main.py", "--debug", "--read-only"],
"cwd": "path\\to\\cheat-engine-server-python"
}
}
}Restart Claude Desktop after adding the configuration.
FAQ
- Can this server modify memory?
- No, the MCP Cheat Engine Server operates exclusively in read-only mode. It can read and analyze memory but cannot modify it, ensuring safety and preventing accidental system instability.
- What processes can I attach to?
- You can only attach to processes that are whitelisted in the `server/config/whitelist.json` file. By default, common applications like Notepad and Calculator are allowed. You can modify this file to add or remove processes as needed.
- Why do I need administrator privileges?
- Administrator privileges are required for accessing memory across processes in Windows. Without these permissions, the server would be unable to attach to processes or read their memory contents.
Compare cheat-engine-server-python with
Last updated · Auto-generated from public README + GitHub signals.