MCP Catalogs
Home

cheatengine-mcp-bridge

by miscusi-peek·691·Score 54

MCP server connecting AI assistants directly to Cheat Engine for automated reverse engineering and memory analysis.

developer-toolssecurityai-llm
119
Forks
4
Open issues
this month
Last commit
2d ago
Indexed

Overview

This MCP server bridges AI assistants like Claude, Cursor, and Copilot with Cheat Engine, enabling natural language programming for reverse engineering tasks. It provides ~180 tools for memory reading, pointer scanning, code analysis, debugging, and process manipulation - transforming days of manual work into minutes of AI-assisted discovery. The bridge uses a Python MCP server communicating with Cheat Engine via Named Pipes and Lua scripts.

Try asking AI

After installing, here are 6 things you can ask your AI assistant:

you:Automating memory analysis and pointer scanning in reverse engineering
you:Creating game trainers and security auditing tools with AI assistance
you:Generating unique AOB patterns for game updates and patches
you:Is this Windows only?
you:How do I prevent BSOD when using DBVM?
you:What AI assistants support this MCP server?

When to choose this

When performing reverse engineering, game modding, or security audits where you need to automate memory analysis and pointer scanning using AI assistance.

When NOT to choose this

If you're not working on Windows, need to analyze non-x86 architectures, or require stable, long-term support as this is a specialized tool with a narrow focus.

Tools this server exposes

12 tools extracted from the README
  • read_memory

    Read any data type from memory

  • scan_all

    Find values in memory

  • disassemble

    Disassemble code at a given address

  • find_references

    Find memory references to an address

  • open_process

    Attach to a running process

  • set_breakpoint

    Set hardware breakpoint at address

  • read_pointer_chain

    Follow pointer chains in memory

  • allocate_memory

    Allocate memory in target process

  • inject_dll

    Inject a DLL into target process

  • assemble_instruction

    Assemble x86/x64 instruction to bytes

  • get_process_list

    List all running processes

  • ping

    Verify MCP server connection

Comparable tools

ida-pro-mcpghidra-mcpwindbg-mcp

Installation

Installation

  1. Install Python dependencies:
pip install -r MCP_Server/requirements.txt

Or manually:

pip install mcp pywin32
  1. Load bridge in Cheat Engine:
  • Enable DBVM in Cheat Engine if you plan to use DBVM tools
  • Open Cheat Engine's Lua Engine or script executor
  • Execute MCP_Server/ce_mcp_bridge.lua
  1. Configure MCP client (e.g., Claude Desktop):
{
  "servers": {
    "cheatengine": {
      "command": "python",
      "args": ["C:/path/to/MCP_Server/mcp_cheatengine.py"]
    }
  }
}
  1. Restart client and verify connection with ping tool.

FAQ

Is this Windows only?
Yes, the bridge currently only supports Windows due to its use of Named Pipes (pywin32).
How do I prevent BSOD when using DBVM?
You MUST disable: Cheat Engine → Settings → Extra → 'Query memory region routines' to prevent CLOCK_WATCHDOG_TIMEOUT BSODs.
What AI assistants support this MCP server?
The bridge works with Claude, Cursor, Copilot, and any other AI clients that support the MCP protocol.

Compare cheatengine-mcp-bridge with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.