The structure of cyclocreatine is fairly flat (planar), which aids in passive diffusion across membranes. It has been used with success in an animal study, where mice suffered from a SLC6A8 (creatine transporter at the blood brain barrier) deficiency, which is not responsive to standard creatine supplementation.  This study failed to report increases in creatine stores in the brain, but noted a reduction of mental retardation associated with increased cyclocreatine and phosphorylated cyclocreatine storages.  As demonstrated by this animal study and previous ones, cyclocreatine is bioactive after oral ingestion   and may merely be a creatine mimetic, able to phosphorylate ADP via the creatine kinase system. 
Two of my clients suffered their DVR’s being recruited to the Mirai Botnet earlier this year. AVTECH have been unresponsive and as a short-term fix, unexpected ports were configured prevent the devices being compromised. Each compromised device had an IP address applied in the 10.*.*.* range (I can’t remember the actual configuration). The devices went off line and the performance, even at the local console was severely degraded. The problem for my clients is that they require access to these DVR’s as a key business requirement. They haven’t been hacked since the ports were changed but reading further I see that the new variant of this attack no longer requires the admin password to commandeer the device. Does anyone know if it is possible to detect if they have been compromised?