IDA Pro MCP server enables AI-assisted reverse engineering by providing tools to analyze, decompile, and modify binaries directly through Model Context Protocol clients like Claude and Cursor.
Check if the IDA plugin is running.
Get metadata about the current IDB.
Get a function by its name.
Get a function by its address.
Get the address currently selected by the user.
Get the function currently selected by the user.
Convert a number (decimal, hexadecimal) to different representations.
List all functions in the database (paginated).
List matching globals in the database (paginated, filtered).
List all globals in the database (paginated).
List matching strings in the database (paginated, filtered).
List all strings in the database (paginated).
List all Local types in the database.
Decompile a function at the given address.
Get assembly code (address: instruction; comment) for a function.
Get all cross references to the given address.
Get all cross references to a named struct field (member).
Get all entry points in the database.
Set a comment for a given address in the function disassembly and pseudocode.
Rename a local variable in a function.
Rename a global variable.
Set a global variable's type.
Rename a function.
Set a function's prototype.
Create or update a local type from a C declaration.
Set a local variable's type.
Get all registers and their values (only available when debugging).
Get the current call stack.
List all breakpoints in the program.
Start the debugger.
Exit the debugger.
Continue the debugger.
Run the debugger to the specified address.
Set a breakpoint at the specified address.
Delete a breakpoint at the specified address.
Enable or disable a breakpoint at the specified address.
{
"mcpServers": {
"github.com/mrexodia/ida-pro-mcp": {
"command": "uv",
"args": [
"--directory",
"c:\\MCP\\ida-pro-mcp",
"run",
"server.py",
"--install-plugin"
],
"timeout": 1800,
"disabled": false
}
}
}