Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] DUP1
- [2] PUSH1 0x40
- [3] MSTORE
- [4] PUSH1 0x04
- [5] CALLDATASIZE
- [6] LT
- [7] ISZERO
- [8] PUSH2 0x0012
- [9] JUMPI
- [10] PUSH0 0x
- [11] DUP1
- [12] REVERT
- [13] JUMPDEST
- [14] PUSH0 0x
- [15] CALLDATALOAD
- [16] PUSH1 0xe0
- [17] SHR
- [18] SWAP1
- [19] DUP2
- [20] PUSH4 0x536fff6c
- [21] EQ
- [22] PUSH2 0x03cb
- [23] JUMPI
- [24] POP
- [25] DUP1
- [26] PUSH4 0x715018a6
- [27] EQ
- [28] PUSH2 0x0331
- [29] JUMPI
- [30] DUP1
- [31] PUSH4 0x8da5cb5b
- [32] EQ
- [33] PUSH2 0x02e1
- [34] JUMPI
- [35] DUP1
- [36] PUSH4 0x9ee8981d
- [37] EQ
- [38] PUSH2 0x0242
- [39] JUMPI
- [40] DUP1
- [41] PUSH4 0xf2fde38b
- [42] EQ
- [43] PUSH2 0x00fe
- [44] JUMPI
- [45] PUSH4 0xfdb991a4
- [46] EQ
- [47] PUSH2 0x005e
- [48] JUMPI
- [49] PUSH0 0x
- [50] DUP1
- [51] REVERT
- [52] JUMPDEST
- [53] CALLVALUE
- [54] PUSH2 0x00fa
- [55] JUMPI
- [56] PUSH1 0x60
- [57] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
- [58] CALLDATASIZE
- [59] ADD
- [60] SLT
- [61] PUSH2 0x00fa
- [62] JUMPI
- [63] PUSH2 0x0095
- [64] PUSH2 0x042f
- [65] JUMP
- [66] JUMPDEST
- [67] PUSH2 0x009d
- [68] PUSH2 0x0452
- [69] JUMP
- [70] JUMPDEST
- [71] POP
- [72] PUSH1 0x44
- [73] CALLDATALOAD
- [74] PUSH32 0xffffffff00000000000000000000000000000000000000000000000000000000
- [75] DUP2
- [76] AND
- [77] SUB
- [78] PUSH2 0x00fa
- [79] JUMPI
- [80] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [81] AND
- [82] PUSH0 0x
- [83] MSTORE
- [84] PUSH1 0x01
- [85] PUSH1 0x20
- [86] MSTORE
- [87] PUSH1 0x20
- [88] PUSH1 0xff
- [89] PUSH1 0x40
- [90] PUSH0 0x
- [91] SHA3
- [92] SLOAD
- [93] AND
- [94] PUSH1 0x40
- [95] MLOAD
- [96] SWAP1
- [97] ISZERO
- [98] ISZERO
- [99] DUP2
- [100] MSTORE
- [101] RETURN
- [102] JUMPDEST
- [103] PUSH0 0x
- [104] DUP1
- [105] REVERT
- [106] JUMPDEST
- [107] CALLVALUE
- [108] PUSH2 0x00fa
- [109] JUMPI
- [110] PUSH1 0x20
- [111] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
- [112] CALLDATASIZE
- [113] ADD
- [114] SLT
- [115] PUSH2 0x00fa
- [116] JUMPI
- [117] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [118] PUSH2 0x014a
- [119] PUSH2 0x042f
- [120] JUMP
- [121] JUMPDEST
- [122] PUSH2 0x0152
- [123] PUSH2 0x0475
- [124] JUMP
- [125] JUMPDEST
- [126] AND
- [127] DUP1
- [128] ISZERO
- [129] PUSH2 0x01be
- [130] JUMPI
- [131] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [132] PUSH0 0x
- [133] SLOAD
- [134] DUP3
- [135] PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
- [136] DUP3
- [137] AND
- [138] OR
- [139] PUSH0 0x
- [140] SSTORE
- [141] AND
- [142] PUSH32 0x8be0079c531659141344cd1fd0a4f28419497f9722a3daafe3b4186f6b6457e0
- [143] PUSH0 0x
- [144] DUP1
- [145] LOG3
- [146] STOP
- [147] JUMPDEST
- [148] PUSH1 0x84
- [149] PUSH1 0x40
- [150] MLOAD
- [151] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
- [152] DUP2
- [153] MSTORE
- [154] PUSH1 0x20
- [155] PUSH1 0x04
- [156] DUP3
- [157] ADD
- [158] MSTORE
- [159] PUSH1 0x26
- [160] PUSH1 0x24
- [161] DUP3
- [162] ADD
- [163] MSTORE
- [164] PUSH32 0x4f776e61626c653a206e6577206f776e657220697320746865207a65726f2061
- [165] PUSH1 0x44
- [166] DUP3
- [167] ADD
- [168] MSTORE
- [169] PUSH32 0x6464726573730000000000000000000000000000000000000000000000000000
- [170] PUSH1 0x64
- [171] DUP3
- [172] ADD
- [173] MSTORE
- [174] REVERT
- [175] JUMPDEST
- [176] CALLVALUE
- [177] PUSH2 0x00fa
- [178] JUMPI
- [179] PUSH1 0x40
- [180] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
- [181] CALLDATASIZE
- [182] ADD
- [183] SLT
- [184] PUSH2 0x00fa
- [185] JUMPI
- [186] PUSH2 0x0279
- [187] PUSH2 0x042f
- [188] JUMP
- [189] JUMPDEST
- [190] PUSH1 0x24
- [191] CALLDATALOAD
- [192] SWAP1
- [193] DUP2
- [194] ISZERO
- [195] ISZERO
- [196] DUP1
- [197] SWAP3
- [198] SUB
- [199] PUSH2 0x00fa
- [200] JUMPI
- [201] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [202] SWAP1
- [203] PUSH2 0x02a5
- [204] PUSH2 0x0475
- [205] JUMP
- [206] JUMPDEST
- [207] AND
- [208] PUSH0 0x
- [209] MSTORE
- [210] PUSH1 0x01
- [211] PUSH1 0x20
- [212] MSTORE
- [213] PUSH1 0x40
- [214] PUSH0 0x
- [215] SHA3
- [216] SWAP1
- [217] PUSH1 0xff
- [218] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00
- [219] DUP4
- [220] SLOAD
- [221] AND
- [222] SWAP2
- [223] AND
- [224] OR
- [225] SWAP1
- [226] SSTORE
- [227] PUSH0 0x
- [228] DUP1
- [229] RETURN
- [230] JUMPDEST
- [231] CALLVALUE
- [232] PUSH2 0x00fa
- [233] JUMPI
- [234] PUSH0 0x
- [235] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
- [236] CALLDATASIZE
- [237] ADD
- [238] SLT
- [239] PUSH2 0x00fa
- [240] JUMPI
- [241] PUSH1 0x20
- [242] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [243] PUSH0 0x
- [244] SLOAD
- [245] AND
- [246] PUSH1 0x40
- [247] MLOAD
- [248] SWAP1
- [249] DUP2
- [250] MSTORE
- [251] RETURN
- [252] JUMPDEST
- [253] CALLVALUE
- [254] PUSH2 0x00fa
- [255] JUMPI
- [256] PUSH0 0x
- [257] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
- [258] CALLDATASIZE
- [259] ADD
- [260] SLT
- [261] PUSH2 0x00fa
- [262] JUMPI
- [263] PUSH2 0x0367
- [264] PUSH2 0x0475
- [265] JUMP
- [266] JUMPDEST
- [267] PUSH0 0x
- [268] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [269] DUP2
- [270] SLOAD
- [271] PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
- [272] DUP2
- [273] AND
- [274] DUP4
- [275] SSTORE
- [276] AND
- [277] PUSH32 0x8be0079c531659141344cd1fd0a4f28419497f9722a3daafe3b4186f6b6457e0
- [278] DUP3
- [279] DUP1
- [280] LOG3
- [281] STOP
- [282] JUMPDEST
- [283] CALLVALUE
- [284] PUSH2 0x00fa
- [285] JUMPI
- [286] PUSH1 0x20
- [287] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
- [288] CALLDATASIZE
- [289] ADD
- [290] SLT
- [291] PUSH2 0x00fa
- [292] JUMPI
- [293] PUSH1 0x20
- [294] SWAP1
- [295] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [296] PUSH2 0x041a
- [297] PUSH2 0x042f
- [298] JUMP
- [299] JUMPDEST
- [300] AND
- [301] PUSH0 0x
- [302] MSTORE
- [303] PUSH1 0x01
- [304] DUP3
- [305] MSTORE
- [306] PUSH1 0xff
- [307] PUSH1 0x40
- [308] PUSH0 0x
- [309] SHA3
- [310] SLOAD
- [311] AND
- [312] ISZERO
- [313] ISZERO
- [314] DUP2
- [315] MSTORE
- [316] RETURN
- [317] JUMPDEST
- [318] PUSH1 0x04
- [319] CALLDATALOAD
- [320] SWAP1
- [321] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [322] DUP3
- [323] AND
- [324] DUP3
- [325] SUB
- [326] PUSH2 0x00fa
- [327] JUMPI
- [328] JUMP
- [329] JUMPDEST
- [330] PUSH1 0x24
- [331] CALLDATALOAD
- [332] SWAP1
- [333] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [334] DUP3
- [335] AND
- [336] DUP3
- [337] SUB
- [338] PUSH2 0x00fa
- [339] JUMPI
- [340] JUMP
- [341] JUMPDEST
- [342] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [343] PUSH0 0x
- [344] SLOAD
- [345] AND
- [346] CALLER
- [347] SUB
- [348] PUSH2 0x0495
- [349] JUMPI
- [350] JUMP
- [351] JUMPDEST
- [352] PUSH1 0x64
- [353] PUSH1 0x40
- [354] MLOAD
- [355] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
- [356] DUP2
- [357] MSTORE
- [358] PUSH1 0x20
- [359] PUSH1 0x04
- [360] DUP3
- [361] ADD
- [362] MSTORE
- [363] PUSH1 0x20
- [364] PUSH1 0x24
- [365] DUP3
- [366] ADD
- [367] MSTORE
- [368] PUSH32 0x4f776e61626c653a2063616c6c6572206973206e6f7420746865206f776e6572
- [369] PUSH1 0x44
- [370] DUP3
- [371] ADD
- [372] MSTORE
- [373] REVERT
- [374] 'fe'(Unknown Opcode)
- [375] LOG1
- [376] PUSH5 0x736f6c6343
- [377] STOP
- [378] ADDMOD
- [379] SHR
- [380] STOP
- [381] EXP