cheatengine 5.8.19 → 5.8.20

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/README_CN.md +41 -41
  2. package/package.json +1 -1
package/README_CN.md CHANGED
@@ -383,47 +383,47 @@ Hook 函数以拦截调用并捕获参数。
383
383
 
384
384
  ## 推荐工作流
385
385
 
386
- ### 指针追踪
387
- ```python
388
- # 自动 (首选)
389
- result = ce_find_pointer_path(address="0x255D5E758")
390
- # 返回: base_address, offsets, ce_pointer_notation
391
-
392
- # 手动 (自动失败时)
393
- # 1. 查找访问该地址的代码
394
- accesses = ce_find_what_accesses(address="0x255D5E758")
395
- # 2. 获取寄存器值 (如 rcx = 0x255D5E658)
396
- # 3. 搜索存储该值的指针
397
- pointers = ce_value_scan(value="0x255D5E658", type="qword")
398
- # 4. 重复直到找到 game.exe+offset
399
- ```
400
-
401
- ### 函数分析
402
- ```python
403
- # 1. 查找函数边界
404
- bounds = ce_find_function_boundaries(address="0x14587EDB0")
405
-
406
- # 2. 跟踪执行
407
- trace = ce_break_and_trace(address="0x14587EDB0", max_steps=100)
408
-
409
- # 3. 生成特征码用于更新
410
- sig = ce_generate_signature(address="0x14587EDB0")
411
- ```
412
-
413
- ### 逆向未知代码
414
- ```python
415
- # 1. 反汇编
416
- code = ce_disassemble(address="0x14587EDB0", count=20)
417
-
418
- # 2. 符号跟踪理解逻辑
419
- symbolic = ce_symbolic_trace(address="0x14587EDB0", initial_state={"rcx": "this"})
420
-
421
- # 3. 为复杂函数构建 CFG
422
- cfg = ce_build_cfg(address="0x14587EDB0")
423
-
424
- # 4. 检测模式
425
- patterns = ce_detect_patterns(address="0x14587EDB0")
426
- ```
386
+ ### 指针追踪
387
+ ```json
388
+ // 自动 (首选)
389
+ {"name": "ce_find_pointer_path", "arguments": {"address": "0x255D5E758", "user_prompted": true}}
390
+ // 返回: base_address, offsets, ce_pointer_notation
391
+
392
+ // 手动 (自动失败时)
393
+ // 1. 查找访问该地址的代码
394
+ {"name": "ce_find_what_accesses", "arguments": {"address": "0x255D5E758", "user_prompted": true}}
395
+ // 2. 从结果获取寄存器值 (如 RBX=0x255D5E658)
396
+ // 3. 搜索存储该值的指针
397
+ {"name": "ce_value_scan", "arguments": {"value": "0x255D5E658", "type": "qword"}}
398
+ // 4. 重复直到找到 game.exe+offset
399
+ ```
400
+
401
+ ### 函数分析
402
+ ```json
403
+ // 1. 查找函数边界
404
+ {"name": "ce_find_function_boundaries", "arguments": {"address": "0x14587EDB0"}}
405
+
406
+ // 2. 跟踪执行
407
+ {"name": "ce_break_and_trace", "arguments": {"address": "0x14587EDB0", "max_steps": 100}}
408
+
409
+ // 3. 生成特征码用于更新
410
+ {"name": "ce_generate_signature", "arguments": {"address": "0x14587EDB0"}}
411
+ ```
412
+
413
+ ### 逆向未知代码
414
+ ```json
415
+ // 1. 反汇编
416
+ {"name": "ce_disassemble", "arguments": {"address": "0x14587EDB0", "count": 20}}
417
+
418
+ // 2. 符号跟踪理解逻辑
419
+ {"name": "ce_symbolic_trace", "arguments": {"address": "0x14587EDB0", "initial_state": {"rcx": "this"}}}
420
+
421
+ // 3. 为复杂函数构建 CFG
422
+ {"name": "ce_build_cfg", "arguments": {"address": "0x14587EDB0"}}
423
+
424
+ // 4. 检测模式
425
+ {"name": "ce_detect_patterns", "arguments": {"address": "0x14587EDB0"}}
426
+ ```
427
427
 
428
428
  ---
429
429
 
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "cheatengine",
3
- "version": "5.8.19",
3
+ "version": "5.8.20",
4
4
  "description": "Cheat Engine MCP Server - AI-assisted reverse engineering bridge",
5
5
  "main": "ce_mcp_server.js",
6
6
  "bin": {