Home / MCP / x64dbg MCP Server

x64dbg MCP Server

Bridges x64dbg with LLMS to provide direct access to debugging functionality through prompts.

python
Installation
Add the following to your MCP client configuration file.

Configuration

View docs
{
    "mcpServers": {
        "x64dbg": {
            "command": "Path\\To\\Python",
            "args": [
                "Path\\to\\x64dbg.py"
            ]
        }
    }
}

You can use the x64dbg MCP Server to connect the x64dbg debugger with large-language models, giving you prompt-driven access to debugging features across both x64dbg and x32dbg. This MCP bridge lets you run and chain debugging actions through prompts, enabling automated analysis and rapid iteration during reverse engineering and software debugging.

How to use

You interact with the MCP server through a client that speaks its interface. Use natural language prompts to perform debugging actions, such as setting breakpoints, inspecting memory, and querying register values. Examples of common prompts include:

  • Set a breakpoint at the main function and step through the first few instructions
  • Read memory and show the next 100 bytes from address 0x401000
  • Show the current values of RAX and RIP
  • Find the pattern '48 8B 05' in the current module

Usage tips

To get the most reliable automated analysis, provide the full path to the executable when asking the system to restart or reinitialize the binary after a crash or hang. This enables the CMDEXEC-like flow to reattach and continue working with minimal intervention.

If you encounter issues connecting from your client, open the logs in x64dbg to find the port the MCP plugin is using and ensure the client points to that port.