FAQs
As more FAQs come, I will update this list
- Is MemRE Better Than Cheat Engine?
No - not by a long shot. Although both are memory scanners, MemRE’s core logic, features, and methods will be completely different. Don’t expect MemRE to be easier to run than Cheat Engine; in fact, it will be more complex.
- Does MemRE Have Cheat Engines Code In It?
No. MemRE is built entirely in C++, with none of Cheat Engine’s logic or code.
- Is MemRE Open Source?
Yes. You can view the source code on GitHub: https://github.com/Do0ks/MemRE
- Is MemRE Compatible On Linux?
Not natively. MemRE uses the Win32 API for both its GUI and memory-scanning core, so it only runs on Windows. You might try running it under Wine on Linux, but compatibility isn’t guaranteed and I won’t be testing that configuration myself.
- Can MemRE Inject Into Anything?
No. Some processes (e.g., web-browser tabs) are sandboxed or run at higher privilege levels. If MemRE fails to inject, you’re likely targeting a sandboxed or elevated process. Note that MemRE itself does not require admin rights to run, but you can to match higher privilege level programs.
- I injected MemRE Into a Process, But Everything Is Bugged! Is It Broken??
Probably not. You’ve most likely injected into a 32-bit process; certain Windows default apps (like Calculator) can behave oddly when attached. You can still use those as a stepping stone: inject into one process, then “attach” from there to another.
- MemREs GUI Kinda sucks.. Make it look better?
The short answer, no. Here's why;
MemRE is injectable, memory management matters more than a typical program running on your computer. Win32 GUI is straight from the 90s, rock solid, and very light weight. I chose not to use any GUI wrappers and coded raw win32 GUI components to keep memory at the minimum. There's a reason MemRE has a load of capabilities already, including a graphical interface and uses less than 0.5MB of ram. While I may include a dark mode in later updates, don't expect the GUI to advance in appearance.
- Why Does MemRE Have Injection AND Attach?
To give you maximum flexibility:
- Standalone (Attach)
Launch MemRE so it establishes its own PID and opens a handle to the target process.
- Injection
Inject the scanner directly into your target (e.g., a game), making MemRE part of that process.
- Combined (Creative)
Inject MemRE into one process (e.g., Internet Explorer), then “attach” from IE into your actual target.
It’s entirely up to you how best to interact with your target.
- Is MemRE a Virus? It's Flagged as a Virus!
No, MemRE is not a virus. Here’s why some antivirus products may still flag it, and what you can do:
- MemRE uses low-level Windows APIs (e.g.
ReadProcessMemory,CreateRemoteThread, DLL injection) to scan and edit another process’s memory. Antivirus engines often treat any program that injects code or manipulates other processes as suspicious, since those same techniques are used by real malware. - MemRE is fully open-source, published under the MIT license, and the source is available on GitHub. You can inspect every line yourself to confirm there’s no hidden malware.
- Always download MemRE directly from the official GitHub releases page, from this website, or from the official Discord (linked above). Do not download anywhere else.
- What to Do If You’re Uncomfortable?
If you do not feel comfortable with using MemRE because of this, I highly encourage you to not use MemRE.
- Online Games?
No. Online-only games are not supported (at least I placed no focus into online games with MemRE).