APE Price: $0.51 (-4.50%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH1 0x0f
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH1 0x32
  • [17] JUMPI
  • [18] PUSH1 0x00
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x0c55699c
  • [24] EQ
  • [25] PUSH1 0x37
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0xb49004e9
  • [29] EQ
  • [30] PUSH1 0x5b
  • [31] JUMPI
  • [32] JUMPDEST
  • [33] PUSH1 0x00
  • [34] DUP1
  • [35] REVERT
  • [36] JUMPDEST
  • [37] PUSH1 0x00
  • [38] SLOAD
  • [39] PUSH1 0x44
  • [40] SWAP1
  • [41] PUSH2 0xffff
  • [42] AND
  • [43] DUP2
  • [44] JUMP
  • [45] JUMPDEST
  • [46] PUSH1 0x40
  • [47] MLOAD
  • [48] PUSH2 0xffff
  • [49] SWAP1
  • [50] SWAP2
  • [51] AND
  • [52] DUP2
  • [53] MSTORE
  • [54] PUSH1 0x20
  • [55] ADD
  • [56] PUSH1 0x40
  • [57] MLOAD
  • [58] DUP1
  • [59] SWAP2
  • [60] SUB
  • [61] SWAP1
  • [62] RETURN
  • [63] JUMPDEST
  • [64] PUSH1 0x61
  • [65] PUSH1 0x63
  • [66] JUMP
  • [67] JUMPDEST
  • [68] STOP
  • [69] JUMPDEST
  • [70] PUSH1 0x00
  • [71] DUP1
  • [72] SLOAD
  • [73] PUSH1 0x01
  • [74] SWAP2
  • [75] SWAP1
  • [76] DUP2
  • [77] SWAP1
  • [78] PUSH1 0x7a
  • [79] SWAP1
  • [80] DUP5
  • [81] SWAP1
  • [82] PUSH2 0xffff
  • [83] AND
  • [84] PUSH1 0x96
  • [85] JUMP
  • [86] JUMPDEST
  • [87] SWAP3
  • [88] POP
  • [89] PUSH2 0x0100
  • [90] EXP
  • [91] DUP2
  • [92] SLOAD
  • [93] DUP2
  • [94] PUSH2 0xffff
  • [95] MUL
  • [96] NOT
  • [97] AND
  • [98] SWAP1
  • [99] DUP4
  • [100] PUSH2 0xffff
  • [101] AND
  • [102] MUL
  • [103] OR
  • [104] SWAP1
  • [105] SSTORE
  • [106] POP
  • [107] JUMP
  • [108] JUMPDEST
  • [109] PUSH2 0xffff
  • [110] DUP2
  • [111] DUP2
  • [112] AND
  • [113] DUP4
  • [114] DUP3
  • [115] AND
  • [116] ADD
  • [117] SWAP1
  • [118] DUP1
  • [119] DUP3
  • [120] GT
  • [121] ISZERO
  • [122] PUSH1 0xbe
  • [123] JUMPI
  • [124] PUSH4 0x4e487b71
  • [125] PUSH1 0xe0
  • [126] SHL
  • [127] PUSH1 0x00
  • [128] MSTORE
  • [129] PUSH1 0x11
  • [130] PUSH1 0x04
  • [131] MSTORE
  • [132] PUSH1 0x24
  • [133] PUSH1 0x00
  • [134] REVERT
  • [135] JUMPDEST
  • [136] POP
  • [137] SWAP3
  • [138] SWAP2
  • [139] POP
  • [140] POP
  • [141] JUMP
  • [142] 'fe'(Unknown Opcode)
  • [143] LOG2
  • [144] PUSH5 0x6970667358
  • [145] '22'(Unknown Opcode)
  • [146] SLT
  • [147] SHA3
  • [148] PUSH7 0x6c87ec50126881
  • [149] PUSH19 0x95a4ca1fc6e3859faf241f38dd688f14513597
  • [150] MULMOD
  • [151] SHA3
  • [152] STOP
  • [153] SWAP3
  • [154] PUSH5 0x736f6c6343
  • [155] STOP
  • [156] ADDMOD
  • [157] SLT
  • [158] STOP
  • [159] CALLER