MCP ExplorerExplorer

Mcp Cheatengine Cto

@Lyoneoson 9 months ago
18 MIT
FreeCommunity
AI Systems
MCP CheatEngine Toolkit - A Python-based toolkit for communicating with CheatEngine through MCP interface

Overview

What is Mcp Cheatengine Cto

mcp-cheatengine-Cto is an unofficial Python-based toolkit designed to communicate with CheatEngine through the MCP interface, enabling memory reading and assembly code analysis.

Use cases

Use cases include debugging applications, analyzing game memory for cheats, performing assembly code analysis, and developing plugins for CheatEngine.

How to use

To use mcp-cheatengine-Cto, install the required dependencies using ‘pip install -r requirements.txt’, then run the service with ‘python main.py’. Use the provided functions like ‘ce_connect()’ for connection and ‘memory_read()’ for reading memory data.

Key features

Key features include automatic connection to CheatEngine, memory and assembly analysis, AI interactive memory reading, and support for analyzing assembly code corresponding to memory addresses.

Where to use

mcp-cheatengine-Cto can be used in software development, game hacking, reverse engineering, and any field that requires memory manipulation or analysis.

Content

MCP CheatEngine Cto

English
简体中文

MCP CheatEngine unofficial is a Python-based toolkit that communicates with CheatEngine through the MCP interface, providing features such as reading memory and assembly code analysis.

Python and CE use the socket protocol for communication. Currently, the Python MCP only has a built-in read module, and the write module has not been implemented in the MCP client. Lua has also implemented writing and pointer scanning, but it’s unstable.

If you’re interested, please give it a star.

  • The project is still in its early stages and there are issues and problems

CE Plugin Link

Features

  • Automatically connect to CheatEngine and analyze application memory and assembly
  • Provide AI interactive memory reading functionality
  • Support getting and analyzing assembly code corresponding to memory addresses

Getting Started

  • It is recommended to use the cursor in conjunction with this project to complete the usage

Install Dependencies

pip install -r requirements.txt

Run MCPService

python main.py

Tool Usage Instructions

For detailed information, please refer to the API documentation

1. Connection Tool (ce_connect)

Used to connect to CheatEngine and check the connection status.

ce_connect()

2. Memory Reading (memory_read)

Read data from a specified memory address.

memory_read("0x7065F60", "int32")

memory_read("0x7065F60", "int32", {
    "assembly": True,
    "assemblySize": 10,
    "rawBytes": True
})

3. Testing Tool (test_echo)

A testing tool that receives input of any type and outputs it unchanged.

# Example
test_echo("Test String")
test_echo({"name": "Test", "value": 100})

UpDate

2025.05.05

  • I recently discovered that Python is able to read memory directly, and this project may be deprecated and discontinued at any time due to the complexity of the code. Future code will probably just leave reading the memory to Python alone.This is because I didn’t think about whether Python had a module that could do it at the beginning of the code design process.

Tools

No tools

Comments

Recommend MCP Servers

View All MCP Servers