cheatengine-mcp-bridge
by beamstar
Overview
Connects AI tools to Cheat Engine for automated reverse engineering, memory analysis, and dynamic tracing in games.
Installation
python MCP_Server/mcp_cheatengine.pySecurity Notes
The server exposes `evaluate_lua` and `auto_assemble` tools, allowing AI to execute arbitrary Lua code and AutoAssembler scripts directly within Cheat Engine's powerful context. This grants extensive control over target process memory, debugging, and potentially system-level operations (especially with DBVM/DBK drivers). While named pipe IPC limits the external network attack surface to local connections, the capabilities exposed by Cheat Engine itself pose significant security and stability risks if the AI is unconstrained or compromised. The project documentation highlights critical setup steps to prevent BSODs, further indicating the inherent low-level risks.
Similar Servers
chrome-devtools-mcp
Control and inspect a live Chrome browser programmatically via an MCP server, enabling AI coding agents to perform reliable automation, in-depth debugging, and performance analysis.
inspector
A web-based client and proxy server for inspecting and interacting with Model Context Protocol (MCP) servers, allowing users to browse resources, prompts, and tools, perform requests, and debug OAuth authentication flows.
MCP-Kali-Server
Enabling AI-driven offensive security testing by bridging AI agents to a Kali Linux terminal for command execution.
UnrealGenAISupport
The plugin enables large language models (LLMs) to programmatically interact with and control Unreal Engine, facilitating generative AI applications in game development, such as spawning objects, manipulating scenes, and generating blueprints or Python scripts.