/ 디렉터리 / 플레이그라운드 / cheatengine-mcp-bridge
● 커뮤니티 miscusi-peek ⚡ 바로 사용

cheatengine-mcp-bridge

제작: miscusi-peek · miscusi-peek/cheatengine-mcp-bridge

Bridge Cheat Engine to AI agents for automated memory analysis, pointer scanning, and reverse engineering via natural language.

cheatengine-mcp-bridge connects AI assistants (Claude, Cursor, Copilot) to Cheat Engine via MCP on Windows. It exposes 43 tools for memory read/write, code disassembly, structure dissection, hardware breakpoints, AOB scanning, RTTI analysis, and DBVM-based invisible tracing. Enables natural language queries like 'find the health pointer' instead of manual hex editing.

왜 쓰나요

핵심 기능

라이브 데모

실제 사용 모습

cheatengine-mcp-bridge.replay ▶ 준비됨
0/0

설치

클라이언트 선택

~/Library/Application Support/Claude/claude_desktop_config.json  · Windows: %APPDATA%\Claude\claude_desktop_config.json
{
  "mcpServers": {
    "cheatengine-mcp-bridge": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/miscusi-peek/cheatengine-mcp-bridge"
      ]
    }
  }
}

Claude Desktop → Settings → Developer → Edit Config 열기. 저장 후 앱 재시작.

~/.cursor/mcp.json · .cursor/mcp.json
{
  "mcpServers": {
    "cheatengine-mcp-bridge": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/miscusi-peek/cheatengine-mcp-bridge"
      ]
    }
  }
}

Cursor는 Claude Desktop과 동일한 mcpServers 스키마 사용. 프로젝트 설정이 전역보다 우선.

VS Code → Cline → MCP Servers → Edit
{
  "mcpServers": {
    "cheatengine-mcp-bridge": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/miscusi-peek/cheatengine-mcp-bridge"
      ]
    }
  }
}

Cline 사이드바의 MCP Servers 아이콘 클릭 후 "Edit Configuration" 선택.

~/.codeium/windsurf/mcp_config.json
{
  "mcpServers": {
    "cheatengine-mcp-bridge": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/miscusi-peek/cheatengine-mcp-bridge"
      ]
    }
  }
}

Claude Desktop과 같은 형식. Windsurf 재시작 후 적용.

~/.continue/config.json
{
  "mcpServers": [
    {
      "name": "cheatengine-mcp-bridge",
      "command": "TODO",
      "args": [
        "See README: https://github.com/miscusi-peek/cheatengine-mcp-bridge"
      ]
    }
  ]
}

Continue는 맵이 아닌 서버 오브젝트 배열 사용.

~/.config/zed/settings.json
{
  "context_servers": {
    "cheatengine-mcp-bridge": {
      "command": {
        "path": "TODO",
        "args": [
          "See README: https://github.com/miscusi-peek/cheatengine-mcp-bridge"
        ]
      }
    }
  }
}

context_servers에 추가. 저장 시 Zed가 핫 리로드.

claude mcp add cheatengine-mcp-bridge -- TODO 'See README: https://github.com/miscusi-peek/cheatengine-mcp-bridge'

한 줄 명령. claude mcp list로 확인, claude mcp remove로 제거.

사용 사례

실전 활용법: cheatengine-mcp-bridge

How to solve a CTF memory analysis challenge with Cheat Engine MCP

👤 CTF participants working on binary exploitation or game hacking challenges ⏱ ~30 min intermediate

언제 쓸까: You have a CTF challenge that requires finding and manipulating values in a running process.

사전 조건
  • Windows with Cheat Engine installed — Download from cheatengine.org
  • MCP bridge running — pip install -r MCP_Server/requirements.txt
흐름
  1. Scan for the target value
    Attach to the CTF challenge process and scan for an integer value of 100 (my current score).✓ 복사됨
    → List of memory addresses containing the value 100
  2. Narrow down the address
    I changed the score to 95. Rescan to find which address actually holds the score.✓ 복사됨
    → Filtered list with likely candidate addresses
  3. Trace the pointer chain
    Find the pointer chain to this address so we can reliably locate it after restart.✓ 복사됨
    → Stable pointer path from base module

결과: A reliable pointer chain to the target value for the CTF solution.

함정
  • Value stored as float instead of integer — Try scanning as float or double if integer scan returns no results

Reverse engineer game data structures with AI assistance

👤 Game modders and reverse engineers analyzing proprietary software they own ⏱ ~45 min advanced

언제 쓸까: You want to understand the memory layout of a program's data structures for educational purposes.

사전 조건
  • Cheat Engine + MCP bridge running — pip install mcp pywin32
  • Target process you own or have authorization to analyze — Launch the application
흐름
  1. Dissect the structure
    Attach to the process and dissect the data structure at address 0x1A3F0000. Identify field types and sizes.✓ 복사됨
    → Structure layout with field offsets, types, and likely names
  2. Find RTTI class info
    Check if this address has RTTI information. What C++ class does it belong to?✓ 복사됨
    → Class name and inheritance chain from RTTI

결과: A documented data structure layout with field types and class hierarchy.

함정
  • RTTI stripped from release builds — Fall back to manual structure dissection and pattern analysis

조합

다른 MCP와 조합해 10배 효율

cheatengine-mcp-bridge + filesystem

Export discovered structures and pointer maps to files for documentation

Document the data structures we found and save them as a markdown file in my notes folder.✓ 복사됨

도구

이 MCP가 노출하는 것

도구입력언제 호출비용
read_memory address: str, size: int Read raw bytes from a memory address 0
read_integer address: str, size?: int Read an integer value from memory 0
scan_all value: str, type: str Scan process memory for a specific value 0
aob_scan pattern: str Search for a byte pattern (array of bytes) in memory 0
disassemble address: str, count?: int Disassemble instructions at an address 0
dissect_structure address: str, size?: int Auto-detect structure layout at an address 0
get_rtti_classname address: str Get the C++ class name via RTTI for an object pointer 0
set_breakpoint address: str, type?: str Set a hardware breakpoint for debugging 0

비용 및 제한

운영 비용

API 쿼터
N/A — all local
호출당 토큰
200–1000 tokens per tool call
금액
Free — requires Cheat Engine (free) and Windows
Use targeted scans (aob_scan, read_integer) instead of full memory dumps to reduce output size.

보안

권한, 시크릿, 파급범위

자격 증명 저장: N/A — local tool, no external credentials
데이터 외부 송신: All operations are local via Named Pipes. No network calls.

문제 해결

자주 발생하는 오류와 해결

Named Pipe connection failed

Ensure Cheat Engine is running and the Lua bridge script is loaded. Check that both CE and the MCP server run with matching privilege levels (both admin or both user).

확인: Check Cheat Engine's Lua console for pipe creation messages
Access denied reading memory

Run Cheat Engine as Administrator. Some processes require elevated privileges for memory access.

확인: Right-click Cheat Engine → Run as Administrator
Scan returns no results

Try different value types (float vs int, 4-byte vs 8-byte). The value might be stored in an unexpected format.

확인: Try a scan with 'All' value type

대안

cheatengine-mcp-bridge 다른 것과 비교

대안언제 쓰나단점/장점
ida-pro-mcpYou need static binary analysis and disassembly rather than live memory manipulationStatic analysis only but much deeper code understanding
mcp-windbgYou need kernel-level debugging or crash dump analysis on WindowsMore powerful debugging but steeper learning curve

더 보기

리소스

📖 GitHub에서 공식 README 읽기

🐙 열린 이슈 보기

🔍 400+ MCP 서버 및 Skills 전체 보기