bethington/cheat-engine-server-python

MCP Cheat Engine Server — provides safe, structured read-only access to memory analysis and debugging functionality through the Model Context Protocol (MCP). For developers, security researchers, and game modders.

48
/ 100
Emerging

This tool provides a safe way for software developers, security researchers, students, and game modders to inspect the memory of running Windows applications. It allows you to feed in a process name or ID and get back detailed information about its memory, including raw data, text, integers, floating-point numbers, and even disassembled code. This is ideal for understanding how programs work, finding specific data, or debugging issues without the risk of accidentally altering the application's behavior.

Use this if you need to safely and systematically examine the memory of a running Windows application to understand its internal workings, debug issues, or analyze its structure.

Not ideal if you need to modify an application's memory or if you are not comfortable working with concepts like memory addresses, data types, and assembly code.

software-debugging reverse-engineering game-modding security-analysis memory-forensics
No Package No Dependents
Maintenance 10 / 25
Adoption 7 / 25
Maturity 15 / 25
Community 16 / 25

How are scores calculated?

Stars

31

Forks

6

Language

Python

License

MIT

Category

debugging-ai-mcp

Last pushed

Jan 29, 2026

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/mcp/bethington/cheat-engine-server-python"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.