Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLVALUE
- [4] DUP1
- [5] ISZERO
- [6] PUSH2 0x000f
- [7] JUMPI
- [8] PUSH0 0x
- [9] DUP1
- [10] REVERT
- [11] JUMPDEST
- [12] POP
- [13] PUSH1 0x04
- [14] CALLDATASIZE
- [15] LT
- [16] PUSH2 0x0029
- [17] JUMPI
- [18] PUSH0 0x
- [19] CALLDATALOAD
- [20] PUSH1 0xe0
- [21] SHR
- [22] DUP1
- [23] PUSH4 0x3593cebc
- [24] EQ
- [25] PUSH2 0x002d
- [26] JUMPI
- [27] JUMPDEST
- [28] PUSH0 0x
- [29] DUP1
- [30] REVERT
- [31] JUMPDEST
- [32] PUSH2 0x0040
- [33] PUSH2 0x003b
- [34] CALLDATASIZE
- [35] PUSH1 0x04
- [36] PUSH2 0x0103
- [37] JUMP
- [38] JUMPDEST
- [39] PUSH2 0x0042
- [40] JUMP
- [41] JUMPDEST
- [42] STOP
- [43] JUMPDEST
- [44] PUSH0 0x
- [45] JUMPDEST
- [46] DUP2
- [47] DUP2
- [48] LT
- [49] ISZERO
- [50] PUSH2 0x00e5
- [51] JUMPI
- [52] DUP5
- [53] PUSH1 0x01
- [54] PUSH1 0x01
- [55] PUSH1 0xa0
- [56] SHL
- [57] SUB
- [58] AND
- [59] PUSH4 0x23b872dd
- [60] CALLER
- [61] DUP7
- [62] DUP7
- [63] DUP7
- [64] DUP7
- [65] DUP2
- [66] DUP2
- [67] LT
- [68] PUSH2 0x006f
- [69] JUMPI
- [70] PUSH2 0x006f
- [71] PUSH2 0x0194
- [72] JUMP
- [73] JUMPDEST
- [74] PUSH1 0x40
- [75] MLOAD
- [76] PUSH1 0x01
- [77] PUSH1 0x01
- [78] PUSH1 0xe0
- [79] SHL
- [80] SUB
- [81] NOT
- [82] PUSH1 0xe0
- [83] DUP9
- [84] SWAP1
- [85] SHL
- [86] AND
- [87] DUP2
- [88] MSTORE
- [89] PUSH1 0x01
- [90] PUSH1 0x01
- [91] PUSH1 0xa0
- [92] SHL
- [93] SUB
- [94] SWAP6
- [95] DUP7
- [96] AND
- [97] PUSH1 0x04
- [98] DUP3
- [99] ADD
- [100] MSTORE
- [101] SWAP5
- [102] SWAP1
- [103] SWAP4
- [104] AND
- [105] PUSH1 0x24
- [106] DUP6
- [107] ADD
- [108] MSTORE
- [109] POP
- [110] PUSH1 0x20
- [111] SWAP1
- [112] SWAP2
- [113] MUL
- [114] ADD
- [115] CALLDATALOAD
- [116] PUSH1 0x44
- [117] DUP3
- [118] ADD
- [119] MSTORE
- [120] PUSH1 0x64
- [121] ADD
- [122] PUSH0 0x
- [123] PUSH1 0x40
- [124] MLOAD
- [125] DUP1
- [126] DUP4
- [127] SUB
- [128] DUP2
- [129] PUSH0 0x
- [130] DUP8
- [131] DUP1
- [132] EXTCODESIZE
- [133] ISZERO
- [134] DUP1
- [135] ISZERO
- [136] PUSH2 0x00c3
- [137] JUMPI
- [138] PUSH0 0x
- [139] DUP1
- [140] REVERT
- [141] JUMPDEST
- [142] POP
- [143] GAS
- [144] CALL
- [145] ISZERO
- [146] DUP1
- [147] ISZERO
- [148] PUSH2 0x00d5
- [149] JUMPI
- [150] RETURNDATASIZE
- [151] PUSH0 0x
- [152] DUP1
- [153] RETURNDATACOPY
- [154] RETURNDATASIZE
- [155] PUSH0 0x
- [156] REVERT
- [157] JUMPDEST
- [158] POP
- [159] POP
- [160] PUSH1 0x01
- [161] SWAP1
- [162] SWAP3
- [163] ADD
- [164] SWAP2
- [165] POP
- [166] PUSH2 0x0044
- [167] SWAP1
- [168] POP
- [169] JUMP
- [170] JUMPDEST
- [171] POP
- [172] POP
- [173] POP
- [174] POP
- [175] POP
- [176] JUMP
- [177] JUMPDEST
- [178] PUSH1 0x01
- [179] PUSH1 0x01
- [180] PUSH1 0xa0
- [181] SHL
- [182] SUB
- [183] DUP2
- [184] AND
- [185] DUP2
- [186] EQ
- [187] PUSH2 0x0100
- [188] JUMPI
- [189] PUSH0 0x
- [190] DUP1
- [191] REVERT
- [192] JUMPDEST
- [193] POP
- [194] JUMP
- [195] JUMPDEST
- [196] PUSH0 0x
- [197] DUP1
- [198] PUSH0 0x
- [199] DUP1
- [200] PUSH1 0x60
- [201] DUP6
- [202] DUP8
- [203] SUB
- [204] SLT
- [205] ISZERO
- [206] PUSH2 0x0116
- [207] JUMPI
- [208] PUSH0 0x
- [209] DUP1
- [210] REVERT
- [211] JUMPDEST
- [212] DUP5
- [213] CALLDATALOAD
- [214] PUSH2 0x0121
- [215] DUP2
- [216] PUSH2 0x00ec
- [217] JUMP
- [218] JUMPDEST
- [219] SWAP4
- [220] POP
- [221] PUSH1 0x20
- [222] DUP6
- [223] ADD
- [224] CALLDATALOAD
- [225] PUSH2 0x0131
- [226] DUP2
- [227] PUSH2 0x00ec
- [228] JUMP
- [229] JUMPDEST
- [230] SWAP3
- [231] POP
- [232] PUSH1 0x40
- [233] DUP6
- [234] ADD
- [235] CALLDATALOAD
- [236] PUSH8 0xffffffffffffffff
- [237] DUP2
- [238] GT
- [239] ISZERO
- [240] PUSH2 0x014c
- [241] JUMPI
- [242] PUSH0 0x
- [243] DUP1
- [244] REVERT
- [245] JUMPDEST
- [246] DUP6
- [247] ADD
- [248] PUSH1 0x1f
- [249] DUP2
- [250] ADD
- [251] DUP8
- [252] SGT
- [253] PUSH2 0x015c
- [254] JUMPI
- [255] PUSH0 0x
- [256] DUP1
- [257] REVERT
- [258] JUMPDEST
- [259] DUP1
- [260] CALLDATALOAD
- [261] PUSH8 0xffffffffffffffff
- [262] DUP2
- [263] GT
- [264] ISZERO
- [265] PUSH2 0x0172
- [266] JUMPI
- [267] PUSH0 0x
- [268] DUP1
- [269] REVERT
- [270] JUMPDEST
- [271] DUP8
- [272] PUSH1 0x20
- [273] DUP3
- [274] PUSH1 0x05
- [275] SHL
- [276] DUP5
- [277] ADD
- [278] ADD
- [279] GT
- [280] ISZERO
- [281] PUSH2 0x0186
- [282] JUMPI
- [283] PUSH0 0x
- [284] DUP1
- [285] REVERT
- [286] JUMPDEST
- [287] SWAP5
- [288] SWAP8
- [289] SWAP4
- [290] SWAP7
- [291] POP
- [292] PUSH1 0x20
- [293] ADD
- [294] SWAP5
- [295] POP
- [296] POP
- [297] POP
- [298] JUMP
- [299] JUMPDEST
- [300] PUSH4 0x4e487b71
- [301] PUSH1 0xe0
- [302] SHL
- [303] PUSH0 0x
- [304] MSTORE
- [305] PUSH1 0x32
- [306] PUSH1 0x04
- [307] MSTORE
- [308] PUSH1 0x24
- [309] PUSH0 0x
- [310] REVERT
- [311] 'fe'(Unknown Opcode)
- [312] LOG2
- [313] PUSH5 0x6970667358
- [314] '22'(Unknown Opcode)
- [315] SLT
- [316] SHA3
- [317] PUSH24 0x850dbd0d975f8acbb46f52e486bb55782281e64320a5b450
- [318] '29'(Unknown Opcode)
- [319] CREATE2