DeveloperMODE-korea/Cheat_Engine_MCP
If you are the rightful owner of Cheat_Engine_MCP and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.
The Cheat Engine MCP Server is a Model Context Protocol server that enables memory scanning capabilities using Cheat Engine, allowing AI assistants and other MCP clients to interact with process memory through a standardized interface.
Cheat Engine MCP Server 🚀
A Model Context Protocol (MCP) server that provides memory scanning capabilities using Cheat Engine. This server allows AI assistants and other MCP clients to interact with process memory through a simple, standardized interface.
🔗 Links
- Repository: https://github.com/DeveloperMODE-korea/Cheat_Engine_MCP
- Built with: FastMCP - The fast, Pythonic way to build MCP servers
📋 Features
- Memory Scanning: Scan process memory for specific 4-byte integer values
- Cheat Engine Integration: Leverages Cheat Engine's powerful Lua scripting API
- MCP Protocol: Standard Model Context Protocol implementation for AI assistant integration
- Async Support: Built with modern async/await patterns using FastMCP
- Error Handling: Comprehensive error handling and logging
🛠️ Prerequisites
- Python 3.10+ (Python 3.12 recommended)
- Cheat Engine 7.4+ installed on Windows
- uv (Python package manager) or pip
📦 Installation
1. Clone the Repository
git clone https://github.com/DeveloperMODE-korea/Cheat_Engine_MCP.git
cd Cheat_Engine_MCP
2. Install uv (if not already installed)
Windows PowerShell:
iwr https://astral.sh/uv/install.ps1 -UseBasicParsing | iex
macOS/Linux:
curl -LsSf https://astral.sh/uv/install.sh | sh
3. Create Virtual Environment and Install Dependencies
# Install Python 3.12 (if needed)
uv python install 3.12
# Create virtual environment with Python 3.12
uv venv --python 3.12
# Activate virtual environment
# Windows PowerShell:
.\.venv\Scripts\Activate.ps1
# macOS/Linux:
source .venv/bin/activate
# Install fastmcp
uv pip install fastmcp
4. Install Cheat Engine
Download and install Cheat Engine from the official website:
The server will automatically detect Cheat Engine installed in common paths:
C:\Program Files\Cheat Engine 7.5\C:\Program Files\Cheat Engine 7.4\C:\Program Files (x86)\Cheat Engine 7.5\C:\Program Files (x86)\Cheat Engine 7.4\
🚀 Usage
Running the Server
python server.py
The server runs using STDIO transport by default, making it compatible with MCP clients.
Using the Client (Testing)
A test client is included to demonstrate usage:
python client.py
This will:
- Connect to the local MCP server
- Scan
notepad.exefor the value100 - Display the found memory addresses
MCP Tool: start_memory_scan
Parameters:
process_name(str): Name of the process to scan (e.g., "notepad.exe")value_to_scan(int): 4-byte integer value to search for
Returns:
- List of memory addresses (as strings) where the value was found
Example:
async with Client("server.py") as client:
result = await client.call_tool(
"start_memory_scan",
process_name="notepad.exe",
value_to_scan=100
)
print(f"Found addresses: {result}")
📁 Project Structure
Cheat_Engine_MCP/
├── server.py # FastMCP server implementation
├── core_logic.py # Cheat Engine integration logic
├── client.py # Test client for demonstration
├── README.md # This file
├── LICENSE # MIT License
└── .venv/ # Virtual environment (created during setup)
🔧 How It Works
- Server Setup:
server.pycreates a FastMCP server with thestart_memory_scantool - Scan Request: Client calls the tool with process name and value to search
- Lua Script Generation:
core_logic.pydynamically creates a Lua script for Cheat Engine - Cheat Engine Execution: The script is executed via Cheat Engine's command-line interface
- Memory Scan: Cheat Engine scans the target process memory for the specified value
- Result Collection: Found addresses are saved to a file and returned to the client
- Cleanup: Temporary files are automatically deleted
🔒 Security Considerations
- This tool requires Cheat Engine, which is typically flagged by antivirus software
- Only use on processes you own or have permission to debug
- Memory manipulation can cause application instability or crashes
- Not intended for cheating in online games (violates Terms of Service)
🤝 Contributing
Contributions are welcome! Please feel free to submit a Pull Request.
- Fork the repository
- Create your feature branch (
git checkout -b feature/AmazingFeature) - Commit your changes (
git commit -m 'Add some AmazingFeature') - Push to the branch (
git push origin feature/AmazingFeature) - Open a Pull Request
📝 License
This project is licensed under the MIT License - see the file for details.
🙏 Acknowledgments
- FastMCP by @jlowin - The excellent MCP framework used to build this server
- Cheat Engine - The powerful memory scanning and debugging tool
- Model Context Protocol - The standardized protocol for AI assistant integrations
📧 Contact
- Repository: https://github.com/DeveloperMODE-korea/Cheat_Engine_MCP
- Issues: Report a bug or request a feature
Note: This tool is for educational and debugging purposes only. Use responsibly and ethically.