cheatengine-mcp-bridge and cheat-engine-server-python
These are competitors offering different approaches to the same goal: one prioritizes full automation of reverse engineering tasks through direct Cheat Engine integration, while the other emphasizes safety and structured read-only access to memory analysis, forcing users to choose based on whether they need unrestricted functionality or controlled security.
About cheatengine-mcp-bridge
miscusi-peek/cheatengine-mcp-bridge
Connect Cursor, Copilot & Claude directly to Cheat Engine via MCP. Automate reverse engineering, pointer scanning, and memory analysis using natural language.
This project dramatically speeds up the task of reverse engineering software, games, or other programs. Instead of manually sifting through raw memory and code, you can use natural language to ask an AI assistant to find specific values, memory addresses, or code structures. It takes your natural language questions and uses them to command Cheat Engine, providing detailed memory and code analysis results.
About cheat-engine-server-python
bethington/cheat-engine-server-python
MCP Cheat Engine Server — provides safe, structured read-only access to memory analysis and debugging functionality through the Model Context Protocol (MCP). For developers, security researchers, and game modders.
This tool provides a safe way for software developers, security researchers, students, and game modders to inspect the memory of running Windows applications. It allows you to feed in a process name or ID and get back detailed information about its memory, including raw data, text, integers, floating-point numbers, and even disassembled code. This is ideal for understanding how programs work, finding specific data, or debugging issues without the risk of accidentally altering the application's behavior.
Scores updated daily from GitHub, PyPI, and npm data. How scores work