cheat-engine-server-python
Provides an MCP server (Python) for safe, structured, read-only access to process memory analysis and debugging-style capabilities (e.g., list/attach to processes, read memory, scan patterns, disassemble, resolve pointer chains, import Cheat Engine tables, and analyze Lua scripts in safe mode).
Score Breakdown
⚙ Agent Friendliness
🔒 Security
README emphasizes read-only mode, requires Administrator/root for memory access, supports a process whitelist (require_whitelist), and logs operations to logs/operations.log. However, no explicit network transport security (TLS) or MCP authentication (API keys/OAuth) is described, which can be a risk if exposed beyond localhost. Dependency hygiene cannot be fully assessed from provided content; noted dependencies include mcp/trio/psutil/capstone without vulnerability status.
⚡ Reliability
Best When
You need a local MCP toolchain for memory reading/analysis with a process whitelist and auditing enabled on Windows (primary supported platform).
Avoid When
You cannot run with appropriate elevated permissions, cannot restrict targets via whitelist, or require cryptographic transport/auth controls for network exposure beyond localhost.
Use Cases
- • Debugging and inspecting your own local applications by reading process memory
- • Reverse engineering education and learning (read-only)
- • Security research workflows that require memory scanning and disassembly
- • Game modding/analysis of client-side behavior (read-only), for legitimate/authorized use
Not For
- • Writing/modifying game or application memory to cheat or bypass protections
- • Remote multi-tenant SaaS access without strong network/auth boundaries
- • Production-grade operations needing guaranteed long-term stability without validating platform-specific behavior
Interface
Authentication
No user auth mechanism is described (e.g., API keys/OAuth) for accessing MCP tools. Access control appears to be primarily process-level (whitelist) plus OS-level privileges.
Pricing
No pricing/licensing beyond MIT license indicated.
Agent Metadata
Known Gotchas
- ⚠ No explicit auth/transport security for MCP described; agents should assume they are connecting to a local process and avoid exposing the server publicly.
- ⚠ Attachment/read behavior depends on admin/root privileges and OS protections/anti-virus; whitelisting may cause failures.
- ⚠ Memory operations can fail due to invalid addresses/protections; tools may require first calling get_memory_regions.
- ⚠ Server appears primarily Windows-focused; limited macOS/Linux support may reduce reliability.
Alternatives
Full Evaluation Report
Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for cheat-engine-server-python.
AI-powered analysis · PDF + markdown · Delivered within 30 minutes
Package Brief
Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.
Delivered within 10 minutes
Score Monitoring
Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.
Continuous monitoring
Scores are editorial opinions as of 2026-03-30.