Cheat Engine MCP Bridge

MCP server that bridges AI assistants to Cheat Engine, enabling natural language interaction with program memory for reverse engineering, debugging, and analysis. Supports reading memory, following pointer chains, scanning for patterns, analyzing structures, identifying C++ object types via RTTI, and setting hardware breakpoints including Ring -1 DBVM tracing.

Evaluated Mar 06, 2026 (0d ago) v11.4.0
Homepage ↗ Repo ↗ Developer Tools cheat-engine mcp reverse-engineering memory-analysis debugging windows lua python breakpoints disassembly
⚙ Agent Friendliness
70
/ 100
Can an agent use this?
🔒 Security
66
/ 100
Is it safe for agents?
⚡ Reliability
55
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
70
Documentation
72
Error Messages
55
Auth Simplicity
80
Rate Limits
62

🔒 Security

TLS Enforcement
78
Auth Strength
65
Scope Granularity
58
Dep. Hygiene
70
Secret Handling
62

Cheat Engine memory debugging MCP bridge. High-privilege process memory access. Only use on authorized systems. Antivirus may flag as suspicious. Authorized game modding only.

⚡ Reliability

Uptime/SLA
55
Version Stability
58
Breaking Changes
52
Error Recovery
55
AF Security Reliability

Best When

You need AI assistance for reverse engineering or debugging Windows applications, want to use natural language to interact with Cheat Engine's powerful memory analysis toolkit.

Avoid When

You are on macOS or Linux, need production-grade debugging tools, or are looking for something with broad community adoption and long-term support guarantees.

Use Cases

  • AI-assisted reverse engineering of Windows executables
  • Natural language memory inspection and pattern scanning
  • Automated C++ object type identification via RTTI analysis
  • AI-driven debugging with hardware and DBVM breakpoints
  • Structure dissection and cross-reference analysis through conversational prompts

Not For

  • Non-Windows platforms - requires Windows named pipes and Cheat Engine
  • Production software testing - designed for research/educational use
  • Malware creation or game cheating in multiplayer environments
  • Beginners with no reverse engineering background

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

OAuth: No Scopes: No

No authentication. Runs locally via named pipes between Python MCP server and Cheat Engine Lua bridge. Requires Windows administrator privileges for memory access.

Pricing

Model: open_source
Free tier: Yes
Requires CC: No

MIT licensed. Requires Cheat Engine (free) separately.

Agent Metadata

Pagination
none
Idempotent
Partial
Retry Guidance
Not documented

Known Gotchas

  • Windows-only - uses named pipes (pywin32)
  • BSOD risk if Cheat Engine settings not configured correctly (must disable Query memory region routines)
  • Requires Cheat Engine 7.6+ with DBVM enabled
  • Python 3.10+ required
  • 43 tools may overwhelm some MCP clients with large tool lists

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for Cheat Engine MCP Bridge.

$99

Scores are editorial opinions as of 2026-03-06.

5215
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered