APE Price: $0.93 (-1.17%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x04
  • [4] CALLDATASIZE
  • [5] LT
  • [6] ISZERO
  • [7] PUSH1 0x15
  • [8] JUMPI
  • [9] JUMPDEST
  • [10] CALLDATASIZE
  • [11] PUSH1 0x69
  • [12] JUMPI
  • [13] PUSH1 0x69
  • [14] JUMP
  • [15] JUMPDEST
  • [16] PUSH0 0x
  • [17] CALLDATALOAD
  • [18] PUSH1 0xe0
  • [19] SHR
  • [20] PUSH4 0x75d0c0dc
  • [21] SUB
  • [22] PUSH1 0x0d
  • [23] JUMPI
  • [24] CALLVALUE
  • [25] PUSH1 0x65
  • [26] JUMPI
  • [27] PUSH0 0x
  • [28] CALLDATASIZE
  • [29] PUSH1 0x03
  • [30] NOT
  • [31] ADD
  • [32] SLT
  • [33] PUSH1 0x65
  • [34] JUMPI
  • [35] PUSH16 0x467265656520313135352050726f7879
  • [36] PUSH1 0x80
  • [37] SHL
  • [38] PUSH1 0xa0
  • [39] MSTORE
  • [40] PUSH1 0x20
  • [41] PUSH1 0xc0
  • [42] MSTORE
  • [43] PUSH1 0x10
  • [44] PUSH1 0xe0
  • [45] MSTORE
  • [46] PUSH1 0x10
  • [47] PUSH1 0xa0
  • [48] PUSH2 0x0100
  • [49] MCOPY
  • [50] PUSH0 0x
  • [51] PUSH2 0x0110
  • [52] MSTORE
  • [53] PUSH1 0x60
  • [54] PUSH1 0xc0
  • [55] RETURN
  • [56] JUMPDEST
  • [57] PUSH0 0x
  • [58] DUP1
  • [59] REVERT
  • [60] JUMPDEST
  • [61] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
  • [62] SLOAD
  • [63] PUSH0 0x
  • [64] SWAP1
  • [65] DUP2
  • [66] SWAP1
  • [67] PUSH1 0x01
  • [68] PUSH1 0x01
  • [69] PUSH1 0xa0
  • [70] SHL
  • [71] SUB
  • [72] AND
  • [73] CALLDATASIZE
  • [74] DUP3
  • [75] DUP1
  • [76] CALLDATACOPY
  • [77] DUP2
  • [78] CALLDATASIZE
  • [79] SWAP2
  • [80] GAS
  • [81] DELEGATECALL
  • [82] RETURNDATASIZE
  • [83] PUSH0 0x
  • [84] DUP1
  • [85] RETURNDATACOPY
  • [86] ISZERO
  • [87] PUSH1 0xad
  • [88] JUMPI
  • [89] RETURNDATASIZE
  • [90] PUSH0 0x
  • [91] RETURN
  • [92] JUMPDEST
  • [93] RETURNDATASIZE
  • [94] PUSH0 0x
  • [95] REVERT
  • [96] 'fe'(Unknown Opcode)
  • [97] LOG2
  • [98] PUSH5 0x6970667358
  • [99] '22'(Unknown Opcode)
  • [100] SLT
  • [101] SHA3
  • [102] JUMP
  • [103] LOG0
  • [104] '4e'(Unknown Opcode)
  • [105] 'df'(Unknown Opcode)
  • [106] '1e'(Unknown Opcode)
  • [107] 'ad'(Unknown Opcode)
  • [108] '2a'(Unknown Opcode)
  • [109] SMOD
  • [110] 'ed'(Unknown Opcode)
  • [111] 'ab'(Unknown Opcode)
  • [112] PUSH8 0xadc6546f088161e4
  • [113] 'ca'(Unknown Opcode)
  • [114] PUSH22 0x634a2d3133bb5412c788ea64736f6c63430008190033