bethington/cheat-engine-server-python
MCP Cheat Engine Server — provides safe, structured read-only access to memory analysis and debugging functionality through the Model Context Protocol (MCP). For developers, security researchers, and game modders.
This tool provides a safe way for software developers, security researchers, students, and game modders to inspect the memory of running Windows applications. It allows you to feed in a process name or ID and get back detailed information about its memory, including raw data, text, integers, floating-point numbers, and even disassembled code. This is ideal for understanding how programs work, finding specific data, or debugging issues without the risk of accidentally altering the application's behavior.
Use this if you need to safely and systematically examine the memory of a running Windows application to understand its internal workings, debug issues, or analyze its structure.
Not ideal if you need to modify an application's memory or if you are not comfortable working with concepts like memory addresses, data types, and assembly code.
Stars
31
Forks
6
Language
Python
License
MIT
Category
Last pushed
Jan 29, 2026
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/mcp/bethington/cheat-engine-server-python"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
drhelius/Gearboy
Game Boy / Gameboy Color emulator, debugger and embedded MCP server for macOS, Windows, Linux,...
drhelius/Gearsystem
Sega Master System / Game Gear / SG-1000 emulator, debugger and embedded MCP server for macOS,...
svnscha/mcp-windbg
Model Context Protocol for WinDBG
miscusi-peek/cheatengine-mcp-bridge
Connect Cursor, Copilot & Claude directly to Cheat Engine via MCP. Automate reverse engineering,...
microsoft/DebugMCP
Gift your VS Code agent a real debugger: breakpoints, stepping, inspection.