Nothing exists such as you provided as an example out-of-the-box to enumerate/list the effective rights for a PI Group, PI User or PI Identity, Windows Group or Windows User. If you want such a tool you will need to create one on your own.
This thread shows how you can extract the ptsecurity and datasecurity attributes that indicate the rights for any PI Identity. Afterward, you will need to verify how your Windows account are connected to the PI identities, what we call PI Mappings. Unfortunately, the PI SDK does not expose the PI Mappings. You would need to maintain an "artificial" list inside your application to get it done right.
Although, a better and efficient way to succeed in your task would be to use the PowerShell Tools for the PI System. This PowerShell module exposes via cmdlets the security and mappings required for. As PowerShell integrates with the .NET Framework, you can perform queries against Active Directory to obtain the group membership for a specific user (if you the proper rights to enumerate in AD). Simply by linking the dot you can confirm if the given user has right to read, write and/or configure the PI Points. The same process can be done with an AF Element.