A modern, lightweight, Cheat-Engine–style memory viewer & AOB scanner.
Memory Byte Viewer is an advanced GUI tool for inspecting, editing, and scanning the memory of Windows processes.
Built with Python, PyQt5, PyMem, and WinAPI, it provides a clean, safe, and developer-friendly alternative to heavy native memory editors.
Perfect for:
- Reverse Engineering
- Memory Debugging
- Offline Game Research
- Malware Analysis
- OS & Memory Education
- 🔍 Hex Memory Viewer with syntax highlighting
- ✏️ Editable bytes (modify & commit changes safely)
- 🔥 AOB Pattern Scanner with wildcard support (
??) - ⚡ Auto-Refresh Mode (live memory monitoring)
- 🧩 Process Explorer (select any running process)
- 🛡 Uses VirtualProtectEx for safe memory writing
- 🎨 Modern dark UI optimized for readability
- 🚫 Full error handling (safe even for beginners)
- Inspect live memory
- Detect function hooks
- View code caves & JMP patches
- Inspect heap/stack structures
- Patch runtime values
- Troubleshoot pointer issues
- Search offsets and signatures
- Test patching
- Explore emulator memory layouts
- View decrypted payloads in RAM
- Analyze suspicious memory regions
- Detect remote injections
Download from: https://www.python.org/
pip install -r requirements.txtpython memory_viewer.pyMemoryByteViewer/
│
├── memory_viewer.py
├── README.md
├── CONTRIBUTING.md
├── LICENSE
├── requirements.txt
├── assets/
│ ├── screenshot_main.png
│ ├── screenshot_pattern.png
│ ├── screenshot_edit.png
│ └── demo.gif
└── docs/
└── MemoryByteViewer_Documentation.pdf
UI Design reference : Walker - @walkerid600010
A complete PDF guide is available here:
docs/MemoryByteViewer_Documentation.pdf
This software is for education, debugging, and security research only.
Do NOT use it on online games or commercial applications.
Arman
Computer Engineer • Reverse Engineering • Systems Research
If you enjoy this project, please consider giving it a ⭐ Star on GitHub! 🌟



