Fatmike-GH/MCPDebugger
A lightweight MCP debugger designed for learning and experimentation. Supports Windows executables (x86 and x64).
This tool helps reverse engineers and security researchers analyze Windows executables (x86 and x64) by providing a lightweight debugger that integrates with AI clients like GitHub Copilot. It takes compiled Windows programs as input and allows you to control their execution, inspect memory, disassemble code, and analyze modules, providing detailed insights into how the software works. Its primary users are individuals performing software analysis or vulnerability research.
Use this if you are a reverse engineer or security analyst who wants to use AI tools to help analyze Windows executables and understand their behavior.
Not ideal if you need a traditional, standalone graphical debugger or if you are analyzing non-Windows or non-x86/x64 executables.
Stars
9
Forks
1
Language
C
License
MIT
Category
Last pushed
Dec 23, 2025
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/mcp/Fatmike-GH/MCPDebugger"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
drhelius/Gearboy
Game Boy / Gameboy Color emulator, debugger and embedded MCP server for macOS, Windows, Linux,...
drhelius/Gearsystem
Sega Master System / Game Gear / SG-1000 emulator, debugger and embedded MCP server for macOS,...
svnscha/mcp-windbg
Model Context Protocol for WinDBG
miscusi-peek/cheatengine-mcp-bridge
Connect Cursor, Copilot & Claude directly to Cheat Engine via MCP. Automate reverse engineering,...
microsoft/DebugMCP
Gift your VS Code agent a real debugger: breakpoints, stepping, inspection.