Python-based toolkit that communicates with CheatEngine through MCP interface, allowing memory reading and assembly code analysis.
MCP CheatEngine unofficial
is a Python-based toolkit that communicates with CheatEngine through the MCP interface, providing features such as reading memory and assembly code analysis.
Python and CE use the socket protocol for communication. Currently, the Python MCP only has a built-in read module, and the write module has not been implemented in the MCP client. Lua has also implemented writing and pointer scanning, but it's unstable.
If you're interested, please give it a star.
pip install -r requirements.txt
python main.py
Used to connect to CheatEngine and check the connection status.
ce_connect()
Read data from a specified memory address.
memory_read("0x7065F60", "int32") memory_read("0x7065F60", "int32", { "assembly": True, "assemblySize": 10, "rawBytes": True })
A testing tool that receives input of any type and outputs it unchanged.
# Example test_echo("Test String") test_echo({"name": "Test", "value": 100})
Discover shared experiences
Shared threads will appear here, showcasing real-world applications and insights from the community. Check back soon for updates!