APE Price: $1.12 (+1.35%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x04
  • [4] CALLDATASIZE
  • [5] LT
  • [6] ISZERO
  • [7] PUSH2 0x0018
  • [8] JUMPI
  • [9] JUMPDEST
  • [10] CALLDATASIZE
  • [11] PUSH2 0x0076
  • [12] JUMPI
  • [13] PUSH2 0x0076
  • [14] JUMP
  • [15] JUMPDEST
  • [16] PUSH1 0x00
  • [17] DUP1
  • [18] CALLDATALOAD
  • [19] PUSH1 0xe0
  • [20] SHR
  • [21] PUSH4 0xc45a0155
  • [22] EQ
  • [23] PUSH2 0x002f
  • [24] JUMPI
  • [25] POP
  • [26] PUSH2 0x000e
  • [27] JUMP
  • [28] JUMPDEST
  • [29] CALLVALUE
  • [30] PUSH2 0x0073
  • [31] JUMPI
  • [32] DUP1
  • [33] PUSH1 0x03
  • [34] NOT
  • [35] CALLDATASIZE
  • [36] ADD
  • [37] SLT
  • [38] PUSH2 0x0073
  • [39] JUMPI
  • [40] PUSH32 0x00000000000000000000000027c960dedfb96c74c30d77972b3394a5621f65d0
  • [41] PUSH1 0x01
  • [42] PUSH1 0x01
  • [43] PUSH1 0xa0
  • [44] SHL
  • [45] SUB
  • [46] AND
  • [47] PUSH1 0x80
  • [48] SWAP1
  • [49] DUP2
  • [50] MSTORE
  • [51] PUSH1 0x20
  • [52] SWAP1
  • [53] RETURN
  • [54] JUMPDEST
  • [55] DUP1
  • [56] REVERT
  • [57] JUMPDEST
  • [58] PUSH1 0x40
  • [59] MLOAD
  • [60] PUSH4 0x5c30ef7f
  • [61] PUSH1 0xe0
  • [62] SHL
  • [63] DUP2
  • [64] MSTORE
  • [65] PUSH1 0x20
  • [66] DUP2
  • [67] PUSH1 0x04
  • [68] DUP2
  • [69] PUSH32 0x00000000000000000000000027c960dedfb96c74c30d77972b3394a5621f65d0
  • [70] PUSH1 0x01
  • [71] PUSH1 0x01
  • [72] PUSH1 0xa0
  • [73] SHL
  • [74] SUB
  • [75] AND
  • [76] GAS
  • [77] STATICCALL
  • [78] SWAP1
  • [79] DUP2
  • [80] ISZERO
  • [81] PUSH2 0x0122
  • [82] JUMPI
  • [83] PUSH1 0x00
  • [84] SWAP2
  • [85] PUSH2 0x00ca
  • [86] JUMPI
  • [87] JUMPDEST
  • [88] POP
  • [89] PUSH2 0x012e
  • [90] JUMP
  • [91] JUMPDEST
  • [92] PUSH1 0x20
  • [93] RETURNDATASIZE
  • [94] DUP2
  • [95] GT
  • [96] PUSH2 0x011b
  • [97] JUMPI
  • [98] JUMPDEST
  • [99] PUSH1 0x1f
  • [100] DUP2
  • [101] ADD
  • [102] PUSH1 0x1f
  • [103] NOT
  • [104] AND
  • [105] DUP3
  • [106] ADD
  • [107] PUSH8 0xffffffffffffffff
  • [108] DUP2
  • [109] GT
  • [110] DUP4
  • [111] DUP3
  • [112] LT
  • [113] OR
  • [114] PUSH2 0x0107
  • [115] JUMPI
  • [116] PUSH2 0x0101
  • [117] SWAP4
  • [118] POP
  • [119] PUSH1 0x40
  • [120] MSTORE
  • [121] DUP2
  • [122] ADD
  • [123] SWAP1
  • [124] PUSH2 0x014d
  • [125] JUMP
  • [126] JUMPDEST
  • [127] CODESIZE
  • [128] PUSH2 0x00c4
  • [129] JUMP
  • [130] JUMPDEST
  • [131] PUSH4 0x4e487b71
  • [132] PUSH1 0xe0
  • [133] SHL
  • [134] DUP5
  • [135] MSTORE
  • [136] PUSH1 0x41
  • [137] PUSH1 0x04
  • [138] MSTORE
  • [139] PUSH1 0x24
  • [140] DUP5
  • [141] REVERT
  • [142] JUMPDEST
  • [143] POP
  • [144] RETURNDATASIZE
  • [145] PUSH2 0x00d4
  • [146] JUMP
  • [147] JUMPDEST
  • [148] PUSH1 0x40
  • [149] MLOAD
  • [150] RETURNDATASIZE
  • [151] PUSH1 0x00
  • [152] DUP3
  • [153] RETURNDATACOPY
  • [154] RETURNDATASIZE
  • [155] SWAP1
  • [156] REVERT
  • [157] JUMPDEST
  • [158] PUSH1 0x00
  • [159] DUP1
  • [160] DUP1
  • [161] SWAP3
  • [162] CALLDATASIZE
  • [163] DUP3
  • [164] DUP1
  • [165] CALLDATACOPY
  • [166] DUP2
  • [167] CALLDATASIZE
  • [168] SWAP2
  • [169] GAS
  • [170] DELEGATECALL
  • [171] RETURNDATASIZE
  • [172] DUP3
  • [173] DUP1
  • [174] RETURNDATACOPY
  • [175] ISZERO
  • [176] PUSH2 0x0149
  • [177] JUMPI
  • [178] RETURNDATASIZE
  • [179] SWAP1
  • [180] RETURN
  • [181] JUMPDEST
  • [182] RETURNDATASIZE
  • [183] SWAP1
  • [184] REVERT
  • [185] JUMPDEST
  • [186] SWAP1
  • [187] DUP2
  • [188] PUSH1 0x20
  • [189] SWAP2
  • [190] SUB
  • [191] SLT
  • [192] PUSH2 0x016c
  • [193] JUMPI
  • [194] MLOAD
  • [195] PUSH1 0x01
  • [196] PUSH1 0x01
  • [197] PUSH1 0xa0
  • [198] SHL
  • [199] SUB
  • [200] DUP2
  • [201] AND
  • [202] DUP2
  • [203] SUB
  • [204] PUSH2 0x016c
  • [205] JUMPI
  • [206] SWAP1
  • [207] JUMP
  • [208] JUMPDEST
  • [209] PUSH1 0x00
  • [210] DUP1
  • [211] REVERT
  • [212] 'fe'(Unknown Opcode)
  • [213] LOG2
  • [214] PUSH5 0x6970667358
  • [215] '22'(Unknown Opcode)
  • [216] SLT
  • [217] SHA3
  • [218] 'f6'(Unknown Opcode)
  • [219] SGT
  • [220] MLOAD
  • [221] SDIV
  • [222] 'e0'(Unknown Opcode)
  • [223] SWAP15
  • [224] RETURNDATASIZE
  • [225] ORIGIN
  • [226] JUMPI
  • [227] PUSH7 0xcaddca074a7c63
  • [228] DUP10
  • [229] DUP9
  • [230] TLOAD
  • [231] '4f'(Unknown Opcode)
  • [232] 'b6'(Unknown Opcode)
  • [233] 'af'(Unknown Opcode)
  • [234] JUMPDEST
  • [235] 'ed'(Unknown Opcode)
  • [236] 'b5'(Unknown Opcode)
  • [237] MOD
  • [238] PUSH7 0x1586e4b764736f