APE Price: $0.52 (-4.22%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x0010
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0036
  • [17] JUMPI
  • [18] PUSH1 0x00
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x46904840
  • [24] EQ
  • [25] PUSH2 0x003b
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0xa8f32251
  • [29] EQ
  • [30] PUSH2 0x0059
  • [31] JUMPI
  • [32] JUMPDEST
  • [33] PUSH1 0x00
  • [34] DUP1
  • [35] REVERT
  • [36] JUMPDEST
  • [37] PUSH2 0x0043
  • [38] PUSH2 0x0077
  • [39] JUMP
  • [40] JUMPDEST
  • [41] PUSH1 0x40
  • [42] MLOAD
  • [43] PUSH2 0x0050
  • [44] MLOAD
  • [45] SWAP1
  • [46] PUSH2 0x00e8
  • [47] JUMP
  • [48] JUMPDEST
  • [49] PUSH1 0x40
  • [50] MLOAD
  • [51] DUP1
  • [52] SWAP2
  • [53] SUB
  • [54] SWAP1
  • [55] RETURN
  • [56] JUMPDEST
  • [57] PUSH2 0x0061
  • [58] PUSH2 0x009b
  • [59] JUMP
  • [60] JUMPDEST
  • [61] PUSH1 0x40
  • [62] MLOAD
  • [63] PUSH2 0x006e
  • [64] SWAP2
  • [65] SWAP1
  • [66] PUSH2 0x011c
  • [67] JUMP
  • [68] JUMPDEST
  • [69] PUSH1 0x40
  • [70] MLOAD
  • [71] DUP1
  • [72] SWAP2
  • [73] SUB
  • [74] SWAP1
  • [75] RETURN
  • [76] JUMPDEST
  • [77] PUSH1 0x00
  • [78] DUP1
  • [79] SLOAD
  • [80] SWAP1
  • [81] PUSH2 0x0100
  • [82] EXP
  • [83] SWAP1
  • [84] DIV
  • [85] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [86] AND
  • [87] DUP2
  • [88] JUMP
  • [89] JUMPDEST
  • [90] PUSH8 0x02c68af0bb140000
  • [91] DUP2
  • [92] JUMP
  • [93] JUMPDEST
  • [94] PUSH1 0x00
  • [95] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [96] DUP3
  • [97] AND
  • [98] SWAP1
  • [99] POP
  • [100] SWAP2
  • [101] SWAP1
  • [102] POP
  • [103] JUMP
  • [104] JUMPDEST
  • [105] PUSH1 0x00
  • [106] PUSH2 0x00d2
  • [107] DUP3
  • [108] PUSH2 0x00a7
  • [109] JUMP
  • [110] JUMPDEST
  • [111] SWAP1
  • [112] POP
  • [113] SWAP2
  • [114] SWAP1
  • [115] POP
  • [116] JUMP
  • [117] JUMPDEST
  • [118] PUSH2 0x00e2
  • [119] DUP2
  • [120] PUSH2 0x00c7
  • [121] JUMP
  • [122] JUMPDEST
  • [123] DUP3
  • [124] MSTORE
  • [125] POP
  • [126] POP
  • [127] JUMP
  • [128] JUMPDEST
  • [129] PUSH1 0x00
  • [130] PUSH1 0x20
  • [131] DUP3
  • [132] ADD
  • [133] SWAP1
  • [134] POP
  • [135] PUSH2 0x00fd
  • [136] PUSH1 0x00
  • [137] DUP4
  • [138] ADD
  • [139] DUP5
  • [140] PUSH2 0x00d9
  • [141] JUMP
  • [142] JUMPDEST
  • [143] SWAP3
  • [144] SWAP2
  • [145] POP
  • [146] POP
  • [147] JUMP
  • [148] JUMPDEST
  • [149] PUSH1 0x00
  • [150] DUP2
  • [151] SWAP1
  • [152] POP
  • [153] SWAP2
  • [154] SWAP1
  • [155] POP
  • [156] JUMP
  • [157] JUMPDEST
  • [158] PUSH2 0x0116
  • [159] DUP2
  • [160] PUSH2 0x0103
  • [161] JUMP
  • [162] JUMPDEST
  • [163] DUP3
  • [164] MSTORE
  • [165] POP
  • [166] POP
  • [167] JUMP
  • [168] JUMPDEST
  • [169] PUSH1 0x00
  • [170] PUSH1 0x20
  • [171] DUP3
  • [172] ADD
  • [173] SWAP1
  • [174] POP
  • [175] PUSH2 0x0131
  • [176] PUSH1 0x00
  • [177] DUP4
  • [178] ADD
  • [179] DUP5
  • [180] PUSH2 0x010d
  • [181] JUMP
  • [182] JUMPDEST
  • [183] SWAP3
  • [184] SWAP2
  • [185] POP
  • [186] POP
  • [187] JUMP
  • [188] 'fe'(Unknown Opcode)
  • [189] LOG2
  • [190] PUSH5 0x6970667358
  • [191] '22'(Unknown Opcode)
  • [192] SLT
  • [193] SHA3
  • [194] 'ef'(Unknown Opcode)
  • [195] 'b6'(Unknown Opcode)
  • [196] MSIZE
  • [197] 'fc'(Unknown Opcode)
  • [198] PC
  • [199] 'af'(Unknown Opcode)
  • [200] GASPRICE
  • [201] 'ad'(Unknown Opcode)
  • [202] '2c'(Unknown Opcode)
  • [203] 'f6'(Unknown Opcode)
  • [204] 'ec'(Unknown Opcode)
  • [205] XOR
  • [206] PUSH31 0x9b81cec7446b7ea19f22dd0a19e6060e23d08c64736f6c63430008130033