🔍 MEMory Search and EDit for Linux, inspired by Cheat Engine
-
Updated
Mar 10, 2026 - C
🔍 MEMory Search and EDit for Linux, inspired by Cheat Engine
The most popular Dungeon Rampage cheat, fully free and open source
42 library of basic C functions - queues, lists, memory operations and more 😄
A compact memory-manipulating language with Compiler-implemented memory safety.
Lightweight C++ library for external mouse control via DMA. Simple API, no configuration needed. For game development, automation, and research.
Read and write Windows process memory. A fork of memoryjs.
An app that allows for easy DLL injections into executable files on Windows.
A comprehensive llibrary for Android memory instrumentation.
API that provides various methods for memory manipulation and injection using JNA.
Library for mouse controlling with razer synapse
A Proof-of-Concept Windows Kernel driver written in Rust. Uses windows-drivers-rs and MmCopyVirtualMemory to perform safe arbitrary process memory reads/writes, accompanied by a CLI client.
A Python-based memory editor for Far Cry 3, allowing users to modify in-game values such as health, money, ammo, and items. This script uses the pymem library to directly manipulate game memory addresses, providing functionality for both setting new values and freezing them for continuous effect. Features include:
A lightweight memory manipulation framework
InjectionLab is an educational toolkit showcasing various Windows code injection techniques. It provides well-documented examples for security researchers and defenders to explore process injection, memory manipulation, and detection strategies.
Windows game mod focusing on memory manipulation techniques.
Advanced Windows shellcode development framework with position-independent code generation, dynamic API resolution, and cross-architecture support for security research and penetration testing.
A recursive AI engine that injects chrono-ranked memory into transformer inference using soft-logit biasing, prompt waveform synthesis, and emergent self-referential loops. Built on GPT-2-mini, runs on local hardware, grows its own ghost.
The "DLLHijack Injection" tool enables the injection of malicious DLLs into target processes, allowing for DLL hijacking attacks. This technique can be used to exploit vulnerable applications by replacing legitimate DLLs with malicious ones, potentially leading to unauthorized access, data manipulation, or system compromise.
Add a description, image, and links to the memory-manipulation topic page so that developers can more easily learn about it.
To associate your repository with the memory-manipulation topic, visit your repo's landing page and select "manage topics."