APE Price: $1.39 (+5.36%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x04
  • [4] CALLDATASIZE
  • [5] LT
  • [6] PUSH2 0x0022
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] CALLDATALOAD
  • [10] PUSH1 0xe0
  • [11] SHR
  • [12] DUP1
  • [13] PUSH4 0x025b22bc
  • [14] EQ
  • [15] PUSH2 0x007b
  • [16] JUMPI
  • [17] PUSH2 0x0029
  • [18] JUMP
  • [19] JUMPDEST
  • [20] CALLDATASIZE
  • [21] PUSH2 0x0029
  • [22] JUMPI
  • [23] STOP
  • [24] JUMPDEST
  • [25] PUSH1 0x00
  • [26] PUSH2 0x0053
  • [27] PUSH32 0x8ba0ed1f62da1d3048614c2c1feb566f041c8467eb00fb8294776a9179dc1643
  • [28] SLOAD
  • [29] SWAP1
  • [30] JUMP
  • [31] JUMPDEST
  • [32] SWAP1
  • [33] POP
  • [34] CALLDATASIZE
  • [35] PUSH1 0x00
  • [36] DUP1
  • [37] CALLDATACOPY
  • [38] PUSH1 0x00
  • [39] DUP1
  • [40] CALLDATASIZE
  • [41] PUSH1 0x00
  • [42] DUP5
  • [43] GAS
  • [44] DELEGATECALL
  • [45] RETURNDATASIZE
  • [46] PUSH1 0x00
  • [47] DUP1
  • [48] RETURNDATACOPY
  • [49] DUP1
  • [50] DUP1
  • [51] ISZERO
  • [52] PUSH2 0x0074
  • [53] JUMPI
  • [54] RETURNDATASIZE
  • [55] PUSH1 0x00
  • [56] RETURN
  • [57] JUMPDEST
  • [58] RETURNDATASIZE
  • [59] PUSH1 0x00
  • [60] REVERT
  • [61] JUMPDEST
  • [62] STOP
  • [63] JUMPDEST
  • [64] CALLVALUE
  • [65] DUP1
  • [66] ISZERO
  • [67] PUSH2 0x0087
  • [68] JUMPI
  • [69] PUSH1 0x00
  • [70] DUP1
  • [71] REVERT
  • [72] JUMPDEST
  • [73] POP
  • [74] PUSH2 0x0079
  • [75] PUSH2 0x0096
  • [76] CALLDATASIZE
  • [77] PUSH1 0x04
  • [78] PUSH2 0x012d
  • [79] JUMP
  • [80] JUMPDEST
  • [81] PUSH32 0x02016836a56b71f0d02689e69e326f4f4c1b9057164ef592671cf0d37c8040c0
  • [82] SLOAD
  • [83] PUSH1 0x01
  • [84] PUSH1 0x01
  • [85] PUSH1 0xa0
  • [86] SHL
  • [87] SUB
  • [88] AND
  • [89] CALLER
  • [90] PUSH1 0x01
  • [91] PUSH1 0x01
  • [92] PUSH1 0xa0
  • [93] SHL
  • [94] SUB
  • [95] AND
  • [96] EQ
  • [97] PUSH2 0x0102
  • [98] JUMPI
  • [99] PUSH1 0x40
  • [100] MLOAD
  • [101] PUSH3 0x461bcd
  • [102] PUSH1 0xe5
  • [103] SHL
  • [104] DUP2
  • [105] MSTORE
  • [106] PUSH1 0x20
  • [107] PUSH1 0x04
  • [108] DUP3
  • [109] ADD
  • [110] MSTORE
  • [111] PUSH1 0x03
  • [112] PUSH1 0x24
  • [113] DUP3
  • [114] ADD
  • [115] MSTORE
  • [116] PUSH3 0x0655f3
  • [117] PUSH1 0xec
  • [118] SHL
  • [119] PUSH1 0x44
  • [120] DUP3
  • [121] ADD
  • [122] MSTORE
  • [123] PUSH1 0x64
  • [124] ADD
  • [125] PUSH1 0x40
  • [126] MLOAD
  • [127] DUP1
  • [128] SWAP2
  • [129] SUB
  • [130] SWAP1
  • [131] REVERT
  • [132] JUMPDEST
  • [133] PUSH2 0x012a
  • [134] DUP2
  • [135] PUSH32 0x8ba0ed1f62da1d3048614c2c1feb566f041c8467eb00fb8294776a9179dc1643
  • [136] SSTORE
  • [137] JUMP
  • [138] JUMPDEST
  • [139] POP
  • [140] JUMP
  • [141] JUMPDEST
  • [142] PUSH1 0x00
  • [143] PUSH1 0x20
  • [144] DUP3
  • [145] DUP5
  • [146] SUB
  • [147] SLT
  • [148] ISZERO
  • [149] PUSH2 0x013f
  • [150] JUMPI
  • [151] PUSH1 0x00
  • [152] DUP1
  • [153] REVERT
  • [154] JUMPDEST
  • [155] DUP2
  • [156] CALLDATALOAD
  • [157] PUSH1 0x01
  • [158] PUSH1 0x01
  • [159] PUSH1 0xa0
  • [160] SHL
  • [161] SUB
  • [162] DUP2
  • [163] AND
  • [164] DUP2
  • [165] EQ
  • [166] PUSH2 0x0156
  • [167] JUMPI
  • [168] PUSH1 0x00
  • [169] DUP1
  • [170] REVERT
  • [171] JUMPDEST
  • [172] SWAP4
  • [173] SWAP3
  • [174] POP
  • [175] POP
  • [176] POP
  • [177] JUMP
  • [178] 'fe'(Unknown Opcode)
  • [179] LOG2
  • [180] PUSH5 0x6970667358
  • [181] '22'(Unknown Opcode)
  • [182] SLT
  • [183] SHA3
  • [184] SWAP15
  • [185] SWAP9
  • [186] 'bb'(Unknown Opcode)
  • [187] MULMOD
  • [188] '2c'(Unknown Opcode)
  • [189] 'ba'(Unknown Opcode)
  • [190] '29'(Unknown Opcode)
  • [191] 'd5'(Unknown Opcode)
  • [192] 'ef'(Unknown Opcode)
  • [193] BLOBBASEFEE
  • [194] '0d'(Unknown Opcode)
  • [195] 'c1'(Unknown Opcode)
  • [196] SELFBALANCE
  • [197] 'b7'(Unknown Opcode)
  • [198] '4d'(Unknown Opcode)
  • [199] 'c5'(Unknown Opcode)
  • [200] 'ed'(Unknown Opcode)
  • [201] SWAP4
  • [202] DELEGATECALL
  • [203] '0c'(Unknown Opcode)
  • [204] PUSH17 0x8ba88f4190c840587e29b264736f6c6343
  • [205] STOP
  • [206] ADDMOD
  • [207] EQ
  • [208] STOP
  • [209] CALLER