BLE MCP Server
A stateful Bluetooth Low Energy (BLE) Model Context Protocol (MCP) server for developer tooling and AI agents. Works out of the box with Claude Code and any MCP-compatible runtime. Communicates over stdio (no HTTP, no open ports) and uses bleak for cross-platform BLE on macOS, Windows, and Linux.
Example: Let Claude Code scan for nearby BLE devices, connect to one, read characteristics, and stream notifications from real hardware.
Demo
7-minute video walkthrough — scanning a real BLE device, discovering services, reading values, and promoting flows into plugins.
Why this exists
You have a BLE device. You want an AI agent to talk to it — scan, connect, read sensors, send commands, stream data. This server makes that possible.
It gives any MCP-compatible agent a full set of BLE tools: scanning, connecting, reading, writing, subscribing to notifications — plus protocol specs and device plugins, so the agent can reason about higher-level device behavior instead of just raw UUIDs and bytes.
The agent calls these tools, gets structured JSON back, and reasons about what to do next — no human in the loop for each BLE operation.
What agents can do with it:
- Develop and debug — connect to your device, explore its services, read characteristics, test commands, and diagnose issues conversationally. "Why is this sensor returning zeros?" becomes a question you can ask.
- Iterate on new hardware — building a BLE device? Attach a protocol spec so the agent understands your commands and data formats as you evolve them.
- Automate testing — write device-specific plugins that expose high-level actions (e.g., device.start_stream, device.run_self_test), then let the agent run test sequences: enable a sensor, collect samples, validate values, report results.
- Explore — point the agent at a device you’ve never seen. It discovers services, probes characteristics, and builds up protocol documentation from scratch.
- Build BLE automation — agents controlling real hardware for real tasks: reading environmental sensors on a schedule, managing a fleet of BLE beacons, triggering actuators based on conditions.
Who is this for?
- Embedded engineers — faster iteration on BLE protocols, conversational debugging, automated test sequences
- Hobbyists and makers — explore BLE devices without writing boilerplate; let the agent help reverse-engineer simple protocols
- QA and test engineers — build repeatable BLE test suites with plugin tools, run them from CI or agent sessions
- Support and field engineers — diagnose BLE device issues interactively without specialized tooling
- Researchers — automate data collection from BLE sensors, explore device capabilities systematically
Quickstart (Claude Code)
pip install ble-mcp-server
# Register the MCP server with Claude Code (read-only by default)
claude mcp add ble -- ble_mcp
Then in Claude Code, try:
"Scan for nearby BLE devices and connect to the one whose name starts with Arduino."
The server is read-only by default. Writes and plugins can control real hardware and execute code, and are opt-in via environment variables. See Safety for details.

What the agent can do
Once connected, the agent has full BLE capabilities:
- Scan for nearby devices, with optional name or service UUID filters
- Connect to a device and discover its services and characteristics
- Read and write characteristic values (writes require
BLE_MCP_ALLOW_WRITES) - Subscribe to notifications and collect streaming data — single events, polling, or batch draining
- Attach protocol specs to understand device-specific commands and data formats
- Use plugins for high-level device operations (e.g.,
sensortag.read_temp) instead of raw reads/writes - Create specs and plugins for new devices, building up reusable knowledge across sessions
The agent handles multi-step flows automatically. For example, "read the temperature from my SensorTag" might involve scanning, connecting, discovering services, attaching a spec, enabling the sensor, and reading the value — without you specifying each step.
At a high level:
Raw BLE → Protocol Spec → Plugin
You can start with raw BLE tools, then move up the stack as your device protocol becomes understood and repeatable. See Concepts for how the pieces fit together.
Install (development)
# Editable install from repo root
pip install -e .
# Or with uv
uv pip install -e .
Add to Claude Code
# Minimal (read-only)
claude mcp add ble -- ble_mcp
# Or run as a module
claude mcp add ble -- python -m ble_mcp_server
# Enable writes
claude mcp add ble -e BLE_MCP_ALLOW_WRITES=true -- ble_mcp
# Enable writes with an allowlist of characteristic UUIDs
claude mcp add ble \
-e BLE_MCP_ALLOW_WRITES=true \
-e BLE_MCP_WRITE_ALLOWLIST="2a00,12345678-1234-1234-1234-123456789abc" \
-- ble_mcp
# Enable all plugins
claude mcp add ble -e BLE_MCP_PLUGINS=all -- ble_mcp
# Enable specific plugins only
claude mcp add ble -e BLE_MCP_PLUGINS=sensortag,hello -- ble_mcp
# Debug logging
claude mcp add ble -e BLE_MCP_LOG_LEVEL=DEBUG -- ble_mcp
MCP is a protocol. Claude Code is one MCP client; other agent runtimes can also connect to this server.
Environment variables
| Variable | Default | Description |
|---|---|---|
BLE_MCP_ALLOW_WRITES | disabled | Set to true, 1, or yes to enable ble.write. |
BLE_MCP_WRITE_ALLOWLIST | empty | Comma-separated UUID allowlist for writable characteristics (checked only when writes are enabled). |
BLE_MCP_PLUGINS | disabled | Plugin policy: all to allow all, or name1,name2 to allow specific plugins. Unset = disabled. |
BLE_MCP_LOG_LEVEL | WARNING | Python log level (DEBUG, INFO, WARNING, ERROR). Logs go to stderr. |
BLE_MCP_TRACE | enabled | JSONL tracing of every tool call. Set to 0, false, or no to disable. |
BLE_MCP_TRACE_PAYLOADS | disabled | Include value_b64/value_hex in traced args (stripped by default). |
BLE_MCP_TRACE_MAX_BYTES | 16384 | Max payload chars before truncation (only applies when TRACE_PAYLOADS is on). |
Tools
See Concepts for how everything fits together, and the Tools Reference for detailed input/output schemas.
| Category | Tools |
|---|---|
| BLE Core | ble.scan_start, ble.scan_get_results, ble.scan_stop, ble.connect, ble.disconnect, ble.connection_status, ble.discover, ble.mtu, ble.read, ble.write, ble.read_descriptor, ble.write_descriptor, ble.subscribe, ble.unsubscribe, ble.wait_notification, ble.poll_notifications, ble.drain_notifications |
| Introspection | ble.connections.list, ble.subscriptions.list, ble.scans.list |
| Protocol Specs | ble.spec.template, ble.spec.register, ble.spec.list, ble.spec.attach, ble.spec.get, ble.spec.read, ble.spec.search |
| Tracing | ble.trace.status, ble.trace.tail |
| Plugins | ble.plugin.template, ble.plugin.list, ble.plugin.reload, ble.plugin.load |
Protocol Specs
Specs are markdown files that describe a BLE device's protocol — services, characteristics, commands, and data formats. They live in .ble_mcp/specs/ and teach the agent what a device can do beyond raw UUIDs and bytes.
Without a spec, the agent can still discover services and read characteristics. With a spec, it knows what the values mean and what commands to send.
You can create specs by telling the agent about your device — paste a datasheet, describe the protocol, or just let it explore and document what it finds. The agent generates the spec file, registers it, and references it in future sessions. You can also write specs by hand.

See Concepts for details on spec format and how the agent uses them.
Plugins
Plugins add device-specific shortcut tools to the server. Instead of the agent composing raw read/write sequences, a plugin provides high-level operations like sensortag.read_temp or ota.upload_firmware.
The agent can also create plugins (with your approval). It explores a device, writes a plugin based on what it learns, and future sessions get shortcut tools — no manual coding required.

To enable plugins:
# Enable all plugins
claude mcp add ble -e BLE_MCP_PLUGINS=all -- ble_mcp
# Enable specific plugins only
claude mcp add ble -e BLE_MCP_PLUGINS=sensortag,ota -- ble_mcp
Editing an already-loaded plugin only requires ble.plugin.reload — no restart needed.
See Concepts for the plugin contract, metadata matching, and how specs and plugins work together.
Tracing
Every tool call is traced to .ble_mcp/traces/trace.jsonl and an in-memory ring buffer (last 2000 events). Tracing is on by default — set BLE_MCP_TRACE=0 to disable.
Event format
Two events per tool call:
{"ts":"2025-01-01T00:00:00.000Z","event":"tool_call_start","tool":"ble.read","args":{"connection_id":"c1","char_uuid":"2a00"},"connection_id":"c1"}
{"ts":"2025-01-01T00:00:00.050Z","event":"tool_call_end","tool":"ble.read","ok":true,"error_code":null,"duration_ms":50,"connection_id":"c1"}
connection_idis extracted from args when presentvalue_b64andvalue_hexare stripped from traced args by default (enable withBLE_MCP_TRACE_PAYLOADS=1)
Inspecting the trace
Use ble.trace.status to check config and event count, and ble.trace.tail to retrieve recent events — no need to read the file directly.
Platform BLE permissions
macOS
No special setup is needed for most cases. On macOS 12+, the Terminal app (or whichever terminal you use) must have Bluetooth permission. Go to System Settings > Privacy & Security > Bluetooth and ensure your terminal is listed and enabled. If running from an IDE, the IDE itself may need the permission.
Windows
Requires Windows 10 version 1709 (Fall Creators Update) or later. No extra drivers needed — bleak uses the native WinRT Bluetooth APIs. Just make sure Bluetooth is turned on in Settings.
Linux
Requires BlueZ 5.43+. Your user must have permission to access the D-Bus Bluetooth interface. The simplest approach:
# Add your user to the bluetooth group
sudo usermod -aG bluetooth $USER
# Then log out and back in
If you are running in a container or headless environment, ensure dbus and bluetoothd are running.
Example session
The repo includes a simulated BLE peripheral you can run on a second machine (e.g. a Raspberry Pi) to try things end-to-end — no real hardware needed. See examples/demo-device/ for setup.
"Scan for BLE devices and connect to DemoDevice. Read the battery level, then start a data collection."
The agent will:
- Scan for nearby devices and find DemoDevice
- Connect and discover its services
- Check for a matching protocol spec — if one exists, attach it to understand the device's protocol
- Check for a matching plugin — if one exists, use its shortcut tools
- If no spec or plugin exists, explore the device using raw BLE tools, or ask you for guidance
- Read the battery level, configure the data service, and start collection
The example includes a pre-built protocol spec and plugin — copy them into .ble_mcp/specs/ and .ble_mcp/plugins/ to skip the exploration phase, or let the agent create its own from scratch.
Try without an agent
You can test the server interactively using the MCP Inspector — no Claude or other agent needed:
npx @modelcontextprotocol/inspector python -m ble_mcp_server
Open the URL with the auth token from the terminal output. The Inspector gives you a web UI to call any tool, see responses, and observe MCP notifications (like disconnect alerts) in real time.
Architecture
- stdio MCP transport — no HTTP, no network ports
- Stateful — connections and subscriptions persist in memory
- Safe by default — writes gated by env flags + allowlist
- Agent-friendly — structured outputs, buffered notifications
- Graceful shutdown — disconnects all clients on exit
Known limitations
-
Real hardware is asynchronous; agent runtimes mostly aren't. Devices disconnect, notifications arrive out of band, and state changes while the agent is thinking. Most agent runtimes are optimized for clean request/response loops. The server bridges this with polling tools, buffered notification queues, and MCP log notifications for disconnects and incoming data — but MCP log notifications are client-dependent (they work in the MCP Inspector; Claude Code currently ignores them). The agent can always detect disconnects on the next tool call and poll for notifications explicitly — the log messages are a best-effort heads-up, not a guarantee.
-
Single-client only. The server handles one MCP session at a time (stdio transport). Multi-client transports (HTTP/SSE) may be added later.
Safety
This server connects an AI agent to real hardware. That's the point — and it means the stakes are higher than pure-software tools.
Plugins execute arbitrary code. When plugins are enabled, the agent can create and run Python code on your machine with full server privileges. Review agent-generated plugins before loading them. Use BLE_MCP_PLUGINS=name1,name2 to allow only specific plugins rather than all.
Writes affect real devices. A bad write to the wrong characteristic can brick a device, trigger unintended behavior, or disrupt other connected systems. Keep writes disabled unless you need them. Use BLE_MCP_WRITE_ALLOWLIST to restrict which characteristics are writable.
Use tool approval deliberately. When your MCP client prompts you to approve a tool call, consider whether you want to allow it once or always. "Always allow" is convenient but means the agent can repeat that action without further confirmation.
This software is provided as-is under the MIT license. You are responsible for what the agent does with your hardware.
License
This project is licensed under the MIT License — see LICENSE for details.
Acknowledgements
This project is built on top of the excellent bleak library for cross-platform BLE in Python.