cheatengine
Advanced tools
+1
-1
| { | ||
| "name": "cheatengine", | ||
| "version": "5.8.27", | ||
| "version": "5.8.28", | ||
| "description": "Cheat Engine MCP Server - AI-assisted reverse engineering bridge", | ||
@@ -5,0 +5,0 @@ "main": "ce_mcp_server.js", |
+10
-8
@@ -10,3 +10,3 @@ [English](README.md) | 中文 | ||
| ``` | ||
| AI <--MCP/JSON-RPC--> ce_mcp_server.py <--命名管道--> ce_mcp_bridge.lua (CE) | ||
| AI <--MCP/JSON-RPC--> ce_mcp_server.js <--命名管道--> ce_mcp_bridge.lua (CE) | ||
| ↑ | ||
@@ -20,3 +20,3 @@ 后台自动重连 | ||
| 1. **安装依赖**: `pip install pywin32` | ||
| 1. **前提条件**: Node.js 14+ (无需其他依赖项) | ||
@@ -30,3 +30,3 @@ 2. **在 CE 中加载** (二选一): | ||
| 3. **配置 MCP** (`.kiro/settings/mcp.json`): | ||
| 3. **配置 MCP** : | ||
| ```json | ||
@@ -51,4 +51,4 @@ { | ||
| "cheat-engine": { | ||
| "command": "python", | ||
| "args": ["D:/path/to/ce_mcp/ce_mcp_server.py"] | ||
| "command": "node", | ||
| "args": ["D:/path/to/ce_mcp/ce_mcp_server.js"] | ||
| } | ||
@@ -164,3 +164,3 @@ } | ||
| #### `ce_aob_scan(aob_string, module?, protection?, max_results?)` | ||
| #### `ce_aob_scan(aob_string, module?, protection?, start?, stop?, max_results?)` | ||
| 扫描内存中的字节数组模式。支持 `??` 通配符。 | ||
@@ -172,6 +172,8 @@ | ||
| - `protection` (string, 可选): 内存保护标志 (默认: `"-C+X"`) | ||
| - `start` (string, 可选): 起始地址(未指定 module 时使用) | ||
| - `stop` (string, 可选): 结束地址(未指定 module 时使用) | ||
| - `max_results` (integer, 可选): 最大结果数 (默认: 100) | ||
| #### `ce_value_scan(value, type, module?, protection?)` | ||
| 扫描特定值。用于指针追踪。**一次性扫描 - 迭代扫描请使用扫描会话。** | ||
| 扫描特定值。用于指针追踪。根据类型自动对齐扫描以优化性能。**一次性扫描 - 迭代扫描请使用扫描会话。** | ||
@@ -191,3 +193,3 @@ **参数:** | ||
| #### `ce_scan_new(value, type, module?, protection?)` | ||
| 开始新的扫描会话。 | ||
| 开始新的扫描会话。根据类型自动对齐扫描以优化性能(dword/float 用 4 字节对齐,qword/double 用 8 字节对齐)。 | ||
@@ -194,0 +196,0 @@ #### `ce_scan_next(session_id, value, scan_type?, value2?)` |
+6
-4
@@ -28,3 +28,3 @@ English | [中文](README_CN.md) | ||
| 3. **Configure MCP** (`.kiro/settings/mcp.json`): | ||
| 3. **Configure MCP** : | ||
| ```json | ||
@@ -161,3 +161,3 @@ { | ||
| #### `ce_aob_scan(aob_string, module?, protection?, max_results?)` | ||
| #### `ce_aob_scan(aob_string, module?, protection?, start?, stop?, max_results?)` | ||
| Scan memory for Array of Bytes pattern. Supports `??` wildcards. | ||
@@ -169,6 +169,8 @@ | ||
| - `protection` (string, optional): Memory protection flags (default: `"-C+X"`) | ||
| - `start` (string, optional): Start address if module not specified | ||
| - `stop` (string, optional): Stop address if module not specified | ||
| - `max_results` (integer, optional): Maximum results (default: 100) | ||
| #### `ce_value_scan(value, type, module?, protection?)` | ||
| Scan for a specific value. Useful for pointer tracing. **One-shot scan - for iterative scanning use Scan Sessions.** | ||
| Scan for a specific value. Useful for pointer tracing. Auto-aligns scan based on type for performance. **One-shot scan - for iterative scanning use Scan Sessions.** | ||
@@ -188,3 +190,3 @@ **Parameters:** | ||
| #### `ce_scan_new(value, type, module?, protection?)` | ||
| Start a new scan session. | ||
| Start a new scan session. Auto-aligns scan based on type for performance (4-byte for dword/float, 8-byte for qword/double). | ||
@@ -191,0 +193,0 @@ #### `ce_scan_next(session_id, value, scan_type?, value2?)` |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 3 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 3 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
383779
0.15%453
0.44%