E
Evoke MCP
by @vmpprotect
A mcp server to interact with a Kernel Driver in use with Cheat Development
Created 4/10/2026
Updated about 5 hours ago
README
Repository documentation and setup instructions
evoke-mcp
small mcp server for low-level memory tooling.
it talks to your kernel driver and exposes a few simple routines over HTTP:
small feature list
get_base_addressread_memorywrite_memory- can be expanded based on your driver.
- in theroy you can do like DLL injection, based on your prompt.
stack
- C++
- Windows APIs
- JSON-RPC style MCP handlers
cpp-httplibfor transport
notes
- currently set up around
FortniteClient-Win64-Shipping.exeinmain.cpp. - server listens on
127.0.0.1:8888. and uses streamable http for the MCP responses. - intended for local tooling / reversing workflows.
- this can be paired really well with mrexodia's IDA MCP
examples
build
open the .vcxproj in Visual Studio and build for your target config.
Quick Setup
Installation guide for this server
Installation Command (package not published)
git clone https://github.com/vmpprotect/evoke-mcp
Manual Installation: Please check the README for detailed setup instructions and any additional dependencies required.
Cursor configuration (mcp.json)
{
"mcpServers": {
"vmpprotect-evoke-mcp": {
"command": "git",
"args": [
"clone",
"https://github.com/vmpprotect/evoke-mcp"
]
}
}
}