Extension Icon

Windows Environment Variables

View, search, edit and manage Windows environment variables and PATH entries. A keyboard-first alternative to the Windows Environment Variables dialog.
Overview

Windows Environment Variables

A keyboard-first alternative to the Windows Environment Variables dialog. Browse, search, edit, create, and delete Windows environment variables and PATH entries directly from Raycast.

Features

  • List & Search — View all User and System environment variables with instant search across names and values
  • Edit PATH — Dedicated PATH editor with drag-to-reorder, existence validation, and duplicate detection
  • Add Variables — Create new environment variables with scope selection (User or System)
  • Copy Actions — Copy variable name, value, or set command format
  • Live Updates — Broadcasts WM_SETTINGCHANGE after every modification so all running apps see changes immediately
  • Safety First — Protected variable detection, confirmation dialogs for destructive actions, PATH backups before modifications

Commands

CommandDescriptionShortcut
List Environment VariablesBrowse and manage all env vars
Edit PATH VariableDedicated PATH entry editor
Add Environment VariableCreate a new variable

Keyboard Shortcuts

List Environment Variables

ActionShortcut
Copy Value
Copy Name⌘⇧C
Copy as SET⌘⇧E
Edit Variable⌘E
Edit in PATH Editor⌘P
Open System Dialog⌘O
Add New Variable⌘N
Delete Variable⌃X
Refresh⌘R

Edit PATH Variable

ActionShortcut
Copy Path
Open in Explorer⌘O
Move Up⌘↑
Move Down⌘↓
Add New Entry⌘N
Remove Entry⌃X
Refresh⌘R

Permissions

  • User variables: No special permissions required
  • System variables: Requires administrator elevation (UAC prompt will appear)

Safety

  • Protected system variables (PATH, COMSPEC, SYSTEMROOT, etc.) cannot be deleted
  • Variables matching sensitive patterns (KEY, TOKEN, SECRET, etc.) are partially masked in the detail view
  • PATH is backed up to local storage before each modification
  • All destructive actions require confirmation
  • PowerShell commands use -EncodedCommand (base64 UTF-16LE) to prevent injection

Platform

Windows only. Requires PowerShell (included with Windows).