/ Каталог / Песочница / cheatengine-mcp-bridge
● Сообщество miscusi-peek ⚡ Сразу

cheatengine-mcp-bridge

автор miscusi-peek · miscusi-peek/cheatengine-mcp-bridge

Bridge Cheat Engine to AI agents for automated memory analysis, pointer scanning, and reverse engineering via natural language.

cheatengine-mcp-bridge connects AI assistants (Claude, Cursor, Copilot) to Cheat Engine via MCP on Windows. It exposes 43 tools for memory read/write, code disassembly, structure dissection, hardware breakpoints, AOB scanning, RTTI analysis, and DBVM-based invisible tracing. Enables natural language queries like 'find the health pointer' instead of manual hex editing.

Зачем использовать

Ключевые функции

Живое демо

Как выглядит на практике

cheatengine-mcp-bridge.replay ▶ готово
0/0

Установка

Выберите клиент

~/Library/Application Support/Claude/claude_desktop_config.json  · Windows: %APPDATA%\Claude\claude_desktop_config.json
{
  "mcpServers": {
    "cheatengine-mcp-bridge": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/miscusi-peek/cheatengine-mcp-bridge"
      ]
    }
  }
}

Откройте Claude Desktop → Settings → Developer → Edit Config. Перезапустите после сохранения.

~/.cursor/mcp.json · .cursor/mcp.json
{
  "mcpServers": {
    "cheatengine-mcp-bridge": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/miscusi-peek/cheatengine-mcp-bridge"
      ]
    }
  }
}

Cursor использует ту же схему mcpServers, что и Claude Desktop. Конфиг проекта приоритетнее глобального.

VS Code → Cline → MCP Servers → Edit
{
  "mcpServers": {
    "cheatengine-mcp-bridge": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/miscusi-peek/cheatengine-mcp-bridge"
      ]
    }
  }
}

Щёлкните значок MCP Servers на боковой панели Cline, затем "Edit Configuration".

~/.codeium/windsurf/mcp_config.json
{
  "mcpServers": {
    "cheatengine-mcp-bridge": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/miscusi-peek/cheatengine-mcp-bridge"
      ]
    }
  }
}

Тот же формат, что и Claude Desktop. Перезапустите Windsurf для применения.

~/.continue/config.json
{
  "mcpServers": [
    {
      "name": "cheatengine-mcp-bridge",
      "command": "TODO",
      "args": [
        "See README: https://github.com/miscusi-peek/cheatengine-mcp-bridge"
      ]
    }
  ]
}

Continue использует массив объектов серверов, а не map.

~/.config/zed/settings.json
{
  "context_servers": {
    "cheatengine-mcp-bridge": {
      "command": {
        "path": "TODO",
        "args": [
          "See README: https://github.com/miscusi-peek/cheatengine-mcp-bridge"
        ]
      }
    }
  }
}

Добавьте в context_servers. Zed перезагружается автоматически.

claude mcp add cheatengine-mcp-bridge -- TODO 'See README: https://github.com/miscusi-peek/cheatengine-mcp-bridge'

Однострочная команда. Проверить: claude mcp list. Удалить: claude mcp remove.

Сценарии использования

Реальные сценарии: cheatengine-mcp-bridge

How to solve a CTF memory analysis challenge with Cheat Engine MCP

👤 CTF participants working on binary exploitation or game hacking challenges ⏱ ~30 min intermediate

Когда использовать: You have a CTF challenge that requires finding and manipulating values in a running process.

Предварительные требования
  • Windows with Cheat Engine installed — Download from cheatengine.org
  • MCP bridge running — pip install -r MCP_Server/requirements.txt
Поток
  1. Scan for the target value
    Attach to the CTF challenge process and scan for an integer value of 100 (my current score).✓ Скопировано
    → List of memory addresses containing the value 100
  2. Narrow down the address
    I changed the score to 95. Rescan to find which address actually holds the score.✓ Скопировано
    → Filtered list with likely candidate addresses
  3. Trace the pointer chain
    Find the pointer chain to this address so we can reliably locate it after restart.✓ Скопировано
    → Stable pointer path from base module

Итог: A reliable pointer chain to the target value for the CTF solution.

Подводные камни
  • Value stored as float instead of integer — Try scanning as float or double if integer scan returns no results

Reverse engineer game data structures with AI assistance

👤 Game modders and reverse engineers analyzing proprietary software they own ⏱ ~45 min advanced

Когда использовать: You want to understand the memory layout of a program's data structures for educational purposes.

Предварительные требования
  • Cheat Engine + MCP bridge running — pip install mcp pywin32
  • Target process you own or have authorization to analyze — Launch the application
Поток
  1. Dissect the structure
    Attach to the process and dissect the data structure at address 0x1A3F0000. Identify field types and sizes.✓ Скопировано
    → Structure layout with field offsets, types, and likely names
  2. Find RTTI class info
    Check if this address has RTTI information. What C++ class does it belong to?✓ Скопировано
    → Class name and inheritance chain from RTTI

Итог: A documented data structure layout with field types and class hierarchy.

Подводные камни
  • RTTI stripped from release builds — Fall back to manual structure dissection and pattern analysis

Комбинации

Сочетайте с другими MCP — эффект x10

cheatengine-mcp-bridge + filesystem

Export discovered structures and pointer maps to files for documentation

Document the data structures we found and save them as a markdown file in my notes folder.✓ Скопировано

Инструменты

Что предоставляет этот MCP

ИнструментВходные данныеКогда вызыватьСтоимость
read_memory address: str, size: int Read raw bytes from a memory address 0
read_integer address: str, size?: int Read an integer value from memory 0
scan_all value: str, type: str Scan process memory for a specific value 0
aob_scan pattern: str Search for a byte pattern (array of bytes) in memory 0
disassemble address: str, count?: int Disassemble instructions at an address 0
dissect_structure address: str, size?: int Auto-detect structure layout at an address 0
get_rtti_classname address: str Get the C++ class name via RTTI for an object pointer 0
set_breakpoint address: str, type?: str Set a hardware breakpoint for debugging 0

Стоимость и лимиты

Во что обходится

Квота API
N/A — all local
Токенов на вызов
200–1000 tokens per tool call
Деньги
Free — requires Cheat Engine (free) and Windows
Совет
Use targeted scans (aob_scan, read_integer) instead of full memory dumps to reduce output size.

Безопасность

Права, секреты, радиус поражения

Хранение учётных данных: N/A — local tool, no external credentials
Исходящий трафик: All operations are local via Named Pipes. No network calls.

Устранение неполадок

Частые ошибки и исправления

Named Pipe connection failed

Ensure Cheat Engine is running and the Lua bridge script is loaded. Check that both CE and the MCP server run with matching privilege levels (both admin or both user).

Проверить: Check Cheat Engine's Lua console for pipe creation messages
Access denied reading memory

Run Cheat Engine as Administrator. Some processes require elevated privileges for memory access.

Проверить: Right-click Cheat Engine → Run as Administrator
Scan returns no results

Try different value types (float vs int, 4-byte vs 8-byte). The value might be stored in an unexpected format.

Проверить: Try a scan with 'All' value type

Альтернативы

cheatengine-mcp-bridge в сравнении

АльтернативаКогда использоватьКомпромисс
ida-pro-mcpYou need static binary analysis and disassembly rather than live memory manipulationStatic analysis only but much deeper code understanding
mcp-windbgYou need kernel-level debugging or crash dump analysis on WindowsMore powerful debugging but steeper learning curve

Ещё

Ресурсы

📖 Читать официальный README на GitHub

🐙 Открытые задачи

🔍 Все 400+ MCP-серверов и Skills