Created by ZxPwd
Discord: zxpwd
A powerful, open-source memory scanner and debugger suite for Windows, inspired by Cheat Engine. This repository contains the main application and its companion projects.
This project is currently under active development. Many features are still being implemented, refined, or are in experimental stages. Expect bugs and incomplete functionality.
| Feature | Status | Notes |
|---|---|---|
| Find What Writes/Accesses | Buggy | Detection may miss some memory accesses |
| Debugger | In Development | Core functionality works, advanced features incomplete |
| Breakpoints | In Development | Hardware breakpoints partially implemented |
| Lua Engine | Incomplete | Core functions work, full API not yet finished |
| UI Improvements | Planned | Various polish and enhancements coming |
- Complete debugger with full breakpoint support
- Enhanced memory access detection reliability
- Comprehensive Lua scripting API
- Improved pointer scanner
- Memory region comparison
- Advanced signature scanning
- Structure dissector
- And much more...
This repository contains three interconnected projects:
CrxMem/
├── CrxMem/ # Main application - Memory scanner and debugger
├── CrxShield/ # Kernel driver for enhanced memory access
└── VEHDebugDll/ # VEH-based debugging DLL
| Project | Description | Language |
|---|---|---|
| CrxMem | Main GUI application for memory scanning, editing, and debugging | C# (.NET 8.0) |
| CrxShield | Windows kernel driver for kernel-level memory access | C (WDK) |
| VEHDebugDll | Vectored Exception Handler DLL for usermode debugging | C++ |
The core memory scanner and debugger with a modern dark-themed interface.
- Memory Scanning - Multiple scan types (exact, increased, decreased, changed, unknown, etc.)
- Value Types - Byte, 2/4/8 Bytes, Float, Double, String, AOB
- Memory Editing - Real-time value modification and freezing
- Memory View - Hex editor with disassembly
- PE Analysis - Analyze executables, imports, exports
- Lua Scripting - Automate tasks (work in progress)
- Debugging - Hardware breakpoints, VEH debugging (work in progress)
- .NET 8.0 (WPF + WinForms)
- Iced - x86/x64 disassembler
- NLua - Lua scripting
- ReaLTaiizor - Modern UI controls
Windows kernel driver providing enhanced memory access capabilities.
- Kernel-level memory read/write
- Process base address retrieval
- Kernel callback enumeration and removal
- Driver hiding (experimental)
Kernel drivers can cause system instability (BSOD). Test on isolated systems only.
Vectored Exception Handler based debugging DLL for injection into target processes.
- Hardware breakpoints (DR0-DR3)
- Memory access monitoring
- Shared memory IPC with CrxMem
- Lock-free, thread-safe operations
- OS: Windows 10/11 (64-bit)
- .NET: .NET 8.0 Runtime (for CrxMem)
- WDK: Windows Driver Kit (for building CrxShield)
- Visual Studio: 2022 with C++ and .NET workloads
cd CrxMem
dotnet build -c ReleaseOutput: CrxMem/bin/Release/net8.0-windows/
- Install Windows Driver Kit (WDK)
- Open
CrxShield/CrxShield.slnin Visual Studio - Build in Release mode
- Enable test signing:
bcdedit /set testsigning on
cd VEHDebugDll
# Using Visual Studio
Open VEHDebug64.vcxproj and build Release x64
# Or using CMake
mkdir build64 && cd build64
cmake .. -A x64
cmake --build . --config Release- Download the latest release
- Extract to a folder of your choice
- Run
CrxMem.exe
sc create CrxShield type= kernel binPath= "C:\path\to\CrxShield.sys"
sc start CrxShield- File > Open Process - Select target process
- Enter the value to find
- Select Value Type (4 Bytes for integers, Float for decimals)
- Click First Scan
- Change the value in the target application
- Enter new value and click Next Scan
- Repeat until you find the address
- Double-click to add to Address List
- Double-click to edit value
- Checkbox to freeze value
- Right-click for more options
CrxMem/
├── Core/ # Core functionality
│ ├── MemoryScanner.cs # Scanning engine
│ ├── ProcessAccess.cs # Memory read/write
│ ├── DebugMonitor.cs # Debugging
│ └── PEAnalyzer.cs # PE analysis
├── LuaScripting/ # Lua engine
├── MemoryView/ # Hex editor & disassembler
├── Legacy/ # Legacy WinForms UI
├── Themes/ # WPF themes
└── MainWindow.xaml # Main UI
CrxShield/
├── driver.c # Main driver code
├── CrxDriverController.h # IOCTL definitions
└── CrxShield.inf # Installation file
VEHDebugDll/
├── VEHDebug.cpp # Main implementation
├── VEHDebug.h # API definitions
└── VEHDebug.def # DLL exports
Contributions are welcome! This project is in early development.
- Fork the repository
- Create a feature branch
- Commit your changes
- Push to the branch
- Open a Pull Request
This software is provided for educational and security research purposes only.
- Do NOT use for malicious purposes
- Do NOT use to bypass anti-cheat in online games
- The author is NOT responsible for any misuse
- Always test kernel drivers on isolated systems
MIT License
Created by ZxPwd

