Python-based MCP server enabling communication with CheatEngine for memory reading, assembly code analysis, and AI-assisted interactive memory inspection via the Model Context Protocol.
Unlock the full potential of MCP CheatEngine Toolkit through LangDB's AI Gateway. Get enterprise-grade security, analytics, and seamless integration with zero configuration.
Free tier available • No credit card required
MCP CheatEngine unofficial
is a Python-based toolkit that communicates with CheatEngine through the MCP interface, providing features such as reading memory and assembly code analysis.
Python and CE use the socket protocol for communication. Currently, the Python MCP only has a built-in read module, and the write module has not been implemented in the MCP client. Lua has also implemented writing and pointer scanning, but it's unstable.
If you're interested, please give it a star.
pip install -r requirements.txt
python main.py
Used to connect to CheatEngine and check the connection status.
ce_connect()
Read data from a specified memory address.
memory_read("0x7065F60", "int32") memory_read("0x7065F60", "int32", { "assembly": True, "assemblySize": 10, "rawBytes": True })
A testing tool that receives input of any type and outputs it unchanged.
# Example test_echo("Test String") test_echo({"name": "Test", "value": 100})
Discover shared experiences
Shared threads will appear here, showcasing real-world applications and insights from the community. Check back soon for updates!