New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details
Socket
Book a DemoSign in
Socket

cheatengine

Package Overview
Dependencies
Maintainers
1
Versions
23
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

cheatengine - npm Package Compare versions

Comparing version
5.8.27
to
5.8.28
+1
-1
package.json
{
"name": "cheatengine",
"version": "5.8.27",
"version": "5.8.28",
"description": "Cheat Engine MCP Server - AI-assisted reverse engineering bridge",

@@ -5,0 +5,0 @@ "main": "ce_mcp_server.js",

@@ -10,3 +10,3 @@ [English](README.md) | 中文

```
AI <--MCP/JSON-RPC--> ce_mcp_server.py <--命名管道--> ce_mcp_bridge.lua (CE)
AI <--MCP/JSON-RPC--> ce_mcp_server.js <--命名管道--> ce_mcp_bridge.lua (CE)

@@ -20,3 +20,3 @@ 后台自动重连

1. **安装依赖**: `pip install pywin32`
1. **前提条件**: Node.js 14+ (无需其他依赖项)

@@ -30,3 +30,3 @@ 2. **在 CE 中加载** (二选一):

3. **配置 MCP** (`.kiro/settings/mcp.json`):
3. **配置 MCP** :
```json

@@ -51,4 +51,4 @@ {

"cheat-engine": {
"command": "python",
"args": ["D:/path/to/ce_mcp/ce_mcp_server.py"]
"command": "node",
"args": ["D:/path/to/ce_mcp/ce_mcp_server.js"]
}

@@ -164,3 +164,3 @@ }

#### `ce_aob_scan(aob_string, module?, protection?, max_results?)`
#### `ce_aob_scan(aob_string, module?, protection?, start?, stop?, max_results?)`
扫描内存中的字节数组模式。支持 `??` 通配符。

@@ -172,6 +172,8 @@

- `protection` (string, 可选): 内存保护标志 (默认: `"-C+X"`)
- `start` (string, 可选): 起始地址(未指定 module 时使用)
- `stop` (string, 可选): 结束地址(未指定 module 时使用)
- `max_results` (integer, 可选): 最大结果数 (默认: 100)
#### `ce_value_scan(value, type, module?, protection?)`
扫描特定值。用于指针追踪。**一次性扫描 - 迭代扫描请使用扫描会话。**
扫描特定值。用于指针追踪。根据类型自动对齐扫描以优化性能。**一次性扫描 - 迭代扫描请使用扫描会话。**

@@ -191,3 +193,3 @@ **参数:**

#### `ce_scan_new(value, type, module?, protection?)`
开始新的扫描会话。
开始新的扫描会话。根据类型自动对齐扫描以优化性能(dword/float 用 4 字节对齐,qword/double 用 8 字节对齐)。

@@ -194,0 +196,0 @@ #### `ce_scan_next(session_id, value, scan_type?, value2?)`

@@ -28,3 +28,3 @@ English | [中文](README_CN.md)

3. **Configure MCP** (`.kiro/settings/mcp.json`):
3. **Configure MCP** :
```json

@@ -161,3 +161,3 @@ {

#### `ce_aob_scan(aob_string, module?, protection?, max_results?)`
#### `ce_aob_scan(aob_string, module?, protection?, start?, stop?, max_results?)`
Scan memory for Array of Bytes pattern. Supports `??` wildcards.

@@ -169,6 +169,8 @@

- `protection` (string, optional): Memory protection flags (default: `"-C+X"`)
- `start` (string, optional): Start address if module not specified
- `stop` (string, optional): Stop address if module not specified
- `max_results` (integer, optional): Maximum results (default: 100)
#### `ce_value_scan(value, type, module?, protection?)`
Scan for a specific value. Useful for pointer tracing. **One-shot scan - for iterative scanning use Scan Sessions.**
Scan for a specific value. Useful for pointer tracing. Auto-aligns scan based on type for performance. **One-shot scan - for iterative scanning use Scan Sessions.**

@@ -188,3 +190,3 @@ **Parameters:**

#### `ce_scan_new(value, type, module?, protection?)`
Start a new scan session.
Start a new scan session. Auto-aligns scan based on type for performance (4-byte for dword/float, 8-byte for qword/double).

@@ -191,0 +193,0 @@ #### `ce_scan_next(session_id, value, scan_type?, value2?)`