MCP server for the BlueSPY Bluetooth LE protocol analyzer. Gives AI assistants direct access to .pcapng capture analysis — load captures, classify packets, inspect connections, analyze advertising data, and find errors through natural conversation. Supports both file analysis and live hardware capture. No scripts or Wireshark needed.
Overview
bluespy MCP Server connects AI assistants to the BlueSPY Bluetooth LE sniffer for protocol analysis.
Capabilities:
- Load and analyze .pcapng capture files
- List devices, connections, and errors
- Inspect advertising data and connection parameters
- Live hardware capture with real-time analysis
- Search packets by type, channel, or content
Requirements:
- BlueSPY application installed (provides libblueSPY.dylib)
pip install bluespy-mcp- BlueSPY Moreph hardware (for live capture only — file analysis works without it)
Server Config
{
"mcpServers": {
"bluespy": {
"command": "bluespy-mcp",
"env": {
"BLUESPY_LIBRARY_PATH": "/Applications/blueSPY.app/Contents/Frameworks/libblueSPY.dylib"
}
}
}
}