cheat-engine-server-python

Provides an MCP server (Python) for safe, structured, read-only access to process memory analysis and debugging-style capabilities (e.g., list/attach to processes, read memory, scan patterns, disassemble, resolve pointer chains, import Cheat Engine tables, and analyze Lua scripts in safe mode).

Evaluated Mar 30, 2026 (21d ago)
Repo ↗ DevTools mcp debugging memory-analysis reverse-engineering read-only windows python
⚙ Agent Friendliness
53
/ 100
Can an agent use this?
🔒 Security
42
/ 100
Is it safe for agents?
⚡ Reliability
21
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
80
Documentation
70
Error Messages
0
Auth Simplicity
40
Rate Limits
0

🔒 Security

TLS Enforcement
10
Auth Strength
35
Scope Granularity
60
Dep. Hygiene
45
Secret Handling
60

README emphasizes read-only mode, requires Administrator/root for memory access, supports a process whitelist (require_whitelist), and logs operations to logs/operations.log. However, no explicit network transport security (TLS) or MCP authentication (API keys/OAuth) is described, which can be a risk if exposed beyond localhost. Dependency hygiene cannot be fully assessed from provided content; noted dependencies include mcp/trio/psutil/capstone without vulnerability status.

⚡ Reliability

Uptime/SLA
0
Version Stability
40
Breaking Changes
0
Error Recovery
45
AF Security Reliability

Best When

You need a local MCP toolchain for memory reading/analysis with a process whitelist and auditing enabled on Windows (primary supported platform).

Avoid When

You cannot run with appropriate elevated permissions, cannot restrict targets via whitelist, or require cryptographic transport/auth controls for network exposure beyond localhost.

Use Cases

  • Debugging and inspecting your own local applications by reading process memory
  • Reverse engineering education and learning (read-only)
  • Security research workflows that require memory scanning and disassembly
  • Game modding/analysis of client-side behavior (read-only), for legitimate/authorized use

Not For

  • Writing/modifying game or application memory to cheat or bypass protections
  • Remote multi-tenant SaaS access without strong network/auth boundaries
  • Production-grade operations needing guaranteed long-term stability without validating platform-specific behavior

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: None stated explicitly for MCP transport; relies on local process permissions/admin and optional process whitelist
OAuth: No Scopes: No

No user auth mechanism is described (e.g., API keys/OAuth) for accessing MCP tools. Access control appears to be primarily process-level (whitelist) plus OS-level privileges.

Pricing

Free tier: No
Requires CC: No

No pricing/licensing beyond MIT license indicated.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • No explicit auth/transport security for MCP described; agents should assume they are connecting to a local process and avoid exposing the server publicly.
  • Attachment/read behavior depends on admin/root privileges and OS protections/anti-virus; whitelisting may cause failures.
  • Memory operations can fail due to invalid addresses/protections; tools may require first calling get_memory_regions.
  • Server appears primarily Windows-focused; limited macOS/Linux support may reduce reliability.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for cheat-engine-server-python.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-30.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered