-
Notifications
You must be signed in to change notification settings - Fork 6
Expand file tree
/
Copy pathmanifest.json
More file actions
106 lines (106 loc) · 2.82 KB
/
manifest.json
File metadata and controls
106 lines (106 loc) · 2.82 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
{
"$schema": "../../dist/dxt-manifest.schema.json",
"dxt_version": "0.1",
"name": "cheat-engine-server-python",
"display_name": "MCP Cheat Engine Server",
"version": "0.1.0",
"description": "A Python MCP server for safe Cheat Engine functionality",
"long_description": "This extension provides safe, structured access to Cheat Engine functionality for code debugging, memory analysis, and educational reverse engineering through the Model Context Protocol.",
"author": {
"name": "Anthropic",
"email": "support@anthropic.com",
"url": "https://github.com/anthropics"
},
"server": {
"type": "python",
"entry_point": "server/main.py",
"mcp_config": {
"command": "python",
"args": [
"${__dirname}/server/main.py",
"--workspace=${user_config.workspace_directory}"
],
"env": {
"DEBUG": "${user_config.debug_mode}",
"PYTHONPATH": "${__dirname}/server/lib"
}
}
},
"tools": [
{
"name": "list_processes",
"description": "Enumerate running processes available for attachment"
},
{
"name": "attach_to_process",
"description": "Attach debugger to specified process"
},
{
"name": "get_process_info",
"description": "Get detailed information about attached process"
},
{
"name": "detach_process",
"description": "Safely detach from current process"
},
{
"name": "read_memory_region",
"description": "Read and analyze a memory region from attached process"
},
{
"name": "scan_memory",
"description": "Pattern scanning within memory regions"
},
{
"name": "get_memory_regions",
"description": "Get virtual memory layout of attached process"
},
{
"name": "analyze_data_structure",
"description": "Analyze memory region and identify probable data structures"
},
{
"name": "find_pointers",
"description": "Find pointer chains targeting specific addresses"
},
{
"name": "disassemble_region",
"description": "Disassemble assembly code from memory region"
}
],
"keywords": [
"memory",
"debugging",
"reverse-engineering",
"cheat-engine",
"analysis"
],
"license": "MIT",
"user_config": {
"workspace_directory": {
"type": "directory",
"title": "Workspace Directory",
"description": "Directory to use as workspace",
"default": "${HOME}/Documents",
"required": false
},
"debug_mode": {
"type": "boolean",
"title": "Debug Mode",
"description": "Enable debug output",
"default": false,
"required": false
}
},
"compatibility": {
"claude_desktop": ">=0.10.0",
"platforms": [
"darwin",
"win32",
"linux"
],
"runtimes": {
"python": ">=3.8.0 <4"
}
}
}