MCP (Model-Context Protocol) server and IDA Pro plugin that exposes IDA’s reversing capabilities (decompile, disassemble, rename, xrefs, debugger, …) via JSON-RPC so LLM-based clients such as Cline, Roo Code, Cursor, VS Code Agent Mode and Claude can automate reverse-engineering tasks.
https://github.com/mrexodia/ida-pro-mcpStop switching between IDA Pro and your AI assistant. This MCP server lets Claude, Cursor, and other AI tools directly control IDA Pro's reversing capabilities—decompiling functions, renaming variables, setting breakpoints, and analyzing binaries without you copying and pasting disassembly back and forth.
Reverse engineering is inherently iterative. You analyze a function, rename variables, add comments, check cross-references, then repeat. But every time you want AI help, you're stuck copying disassembly into chat windows and manually applying suggested changes back in IDA.
IDA Pro MCP eliminates this friction entirely. Your AI assistant can directly:
Instead of spending hours manually analyzing a crackme or malware sample, you can prompt your AI assistant:
"Analyze this crackme starting from the main function. Rename variables to meaningful names, add comments explaining the logic, and find the password validation routine."
The AI will methodically work through IDA Pro, decompiling functions, following the execution flow, renaming variables like sub_401000 to validate_password, and documenting its findings—all without you lifting a finger.
Function Analysis
Interactive Improvements
Advanced Debugging (with --unsafe flag)
pip install git+https://github.com/mrexodia/ida-pro-mcp
ida-pro-mcp --install
That's it. Restart IDA Pro and your AI client—the plugin auto-installs and MCP server configurations are handled automatically.
Compatible with every major AI coding assistant:
Unlike other IDA Pro MCP servers that require complex setup or have limited functionality, this implementation prioritizes developer experience:
idalibWith 2,400+ GitHub stars and active development, this isn't experimental—it's a production-ready tool that reverse engineers are already using to dramatically speed up their analysis workflows.
The developer has also created a reversing dataset with examples showing AI successfully solving real crackmes and analyzing malware samples.
Load a binary in IDA Pro, start your AI assistant, and prompt it to begin analysis. Watch as it systematically works through functions, applies meaningful names, and documents its findings—turning hours of manual work into minutes of guided analysis.
This is what reverse engineering with AI should feel like: seamless, powerful, and actually useful.