APE Price: $0.47 (+3.29%)
    /

    Tools

    Bytecode to Opcode Disassembler

    Attempts to decode the low level Contract Bytecodes to Opcodes.

    Decoded Bytecode:
    • [0] PUSH1 0x80
    • [1] PUSH1 0x40
    • [2] MSTORE
    • [3] PUSH1 0x04
    • [4] CALLDATASIZE
    • [5] LT
    • [6] ISZERO
    • [7] PUSH1 0x15
    • [8] JUMPI
    • [9] JUMPDEST
    • [10] CALLDATASIZE
    • [11] PUSH1 0x90
    • [12] JUMPI
    • [13] PUSH1 0x90
    • [14] JUMP
    • [15] JUMPDEST
    • [16] PUSH1 0x00
    • [17] DUP1
    • [18] CALLDATALOAD
    • [19] PUSH1 0xe0
    • [20] SHR
    • [21] PUSH4 0x75d0c0dc
    • [22] EQ
    • [23] PUSH1 0x2a
    • [24] JUMPI
    • [25] POP
    • [26] PUSH1 0x0d
    • [27] JUMP
    • [28] JUMPDEST
    • [29] CALLVALUE
    • [30] PUSH1 0x8d
    • [31] JUMPI
    • [32] DUP1
    • [33] PUSH1 0x03
    • [34] NOT
    • [35] CALLDATASIZE
    • [36] ADD
    • [37] SLT
    • [38] PUSH1 0x8d
    • [39] JUMPI
    • [40] PUSH1 0xc0
    • [41] PUSH1 0x40
    • [42] MSTORE
    • [43] PUSH1 0x10
    • [44] DUP1
    • [45] PUSH1 0x80
    • [46] MSTORE
    • [47] PUSH1 0xa0
    • [48] SWAP1
    • [49] PUSH16 0x467265656520313135352050726f7879
    • [50] PUSH1 0x80
    • [51] SHL
    • [52] PUSH1 0xa0
    • [53] MSTORE
    • [54] PUSH1 0x20
    • [55] SWAP2
    • [56] PUSH1 0x20
    • [57] PUSH1 0xc0
    • [58] MSTORE
    • [59] PUSH1 0x10
    • [60] PUSH1 0xe0
    • [61] MSTORE
    • [62] DUP4
    • [63] JUMPDEST
    • [64] DUP3
    • [65] DUP2
    • [66] LT
    • [67] PUSH1 0x7d
    • [68] JUMPI
    • [69] DUP5
    • [70] PUSH2 0x0110
    • [71] MSTORE
    • [72] PUSH1 0x60
    • [73] PUSH1 0xc0
    • [74] RETURN
    • [75] JUMPDEST
    • [76] DUP2
    • [77] DUP2
    • [78] ADD
    • [79] MLOAD
    • [80] PUSH2 0x0100
    • [81] DUP3
    • [82] ADD
    • [83] MSTORE
    • [84] DUP4
    • [85] ADD
    • [86] PUSH1 0x6c
    • [87] JUMP
    • [88] JUMPDEST
    • [89] DUP1
    • [90] REVERT
    • [91] JUMPDEST
    • [92] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
    • [93] SLOAD
    • [94] PUSH1 0x00
    • [95] SWAP1
    • [96] DUP2
    • [97] SWAP1
    • [98] DUP2
    • [99] SWAP1
    • [100] PUSH1 0x01
    • [101] PUSH1 0x01
    • [102] PUSH1 0xa0
    • [103] SHL
    • [104] SUB
    • [105] AND
    • [106] CALLDATASIZE
    • [107] DUP3
    • [108] DUP1
    • [109] CALLDATACOPY
    • [110] DUP2
    • [111] CALLDATASIZE
    • [112] SWAP2
    • [113] GAS
    • [114] DELEGATECALL
    • [115] RETURNDATASIZE
    • [116] DUP3
    • [117] DUP1
    • [118] RETURNDATACOPY
    • [119] ISZERO
    • [120] PUSH1 0xd7
    • [121] JUMPI
    • [122] RETURNDATASIZE
    • [123] SWAP1
    • [124] RETURN
    • [125] JUMPDEST
    • [126] RETURNDATASIZE
    • [127] SWAP1
    • [128] REVERT
    • [129] 'fe'(Unknown Opcode)
    • [130] LOG2
    • [131] PUSH5 0x6970667358
    • [132] '22'(Unknown Opcode)
    • [133] SLT
    • [134] SHA3
    • [135] 'b9'(Unknown Opcode)
    • [136] PUSH30 0x4626556c8033ea88530d5c895e3ca12991a4e8452f5c7a2a986f9343538d
    • [137] PUSH5 0x736f6c6343
    • [138] STOP
    • [139] ADDMOD
    • [140] NOT
    • [141] STOP
    • [142] CALLER