APE Price: $1.10 (-2.40%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0034
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x06661abd
  • [24] EQ
  • [25] PUSH2 0x0038
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0xb9d2d32c
  • [29] EQ
  • [30] PUSH2 0x0056
  • [31] JUMPI
  • [32] JUMPDEST
  • [33] PUSH0 0x
  • [34] DUP1
  • [35] REVERT
  • [36] JUMPDEST
  • [37] PUSH2 0x0040
  • [38] PUSH2 0x0060
  • [39] JUMP
  • [40] JUMPDEST
  • [41] PUSH1 0x40
  • [42] MLOAD
  • [43] PUSH2 0x004d
  • [44] SWAP2
  • [45] SWAP1
  • [46] PUSH2 0x0097
  • [47] JUMP
  • [48] JUMPDEST
  • [49] PUSH1 0x40
  • [50] MLOAD
  • [51] DUP1
  • [52] SWAP2
  • [53] SUB
  • [54] SWAP1
  • [55] RETURN
  • [56] JUMPDEST
  • [57] PUSH2 0x005e
  • [58] PUSH2 0x0065
  • [59] JUMP
  • [60] JUMPDEST
  • [61] STOP
  • [62] JUMPDEST
  • [63] PUSH0 0x
  • [64] SLOAD
  • [65] DUP2
  • [66] JUMP
  • [67] JUMPDEST
  • [68] PUSH1 0x01
  • [69] PUSH0 0x
  • [70] DUP1
  • [71] DUP3
  • [72] DUP3
  • [73] SLOAD
  • [74] PUSH2 0x0076
  • [75] SWAP2
  • [76] SWAP1
  • [77] PUSH2 0x00dd
  • [78] JUMP
  • [79] JUMPDEST
  • [80] SWAP3
  • [81] POP
  • [82] POP
  • [83] DUP2
  • [84] SWAP1
  • [85] SSTORE
  • [86] POP
  • [87] JUMP
  • [88] JUMPDEST
  • [89] PUSH0 0x
  • [90] DUP2
  • [91] SWAP1
  • [92] POP
  • [93] SWAP2
  • [94] SWAP1
  • [95] POP
  • [96] JUMP
  • [97] JUMPDEST
  • [98] PUSH2 0x0091
  • [99] DUP2
  • [100] PUSH2 0x007f
  • [101] JUMP
  • [102] JUMPDEST
  • [103] DUP3
  • [104] MSTORE
  • [105] POP
  • [106] POP
  • [107] JUMP
  • [108] JUMPDEST
  • [109] PUSH0 0x
  • [110] PUSH1 0x20
  • [111] DUP3
  • [112] ADD
  • [113] SWAP1
  • [114] POP
  • [115] PUSH2 0x00aa
  • [116] PUSH0 0x
  • [117] DUP4
  • [118] ADD
  • [119] DUP5
  • [120] PUSH2 0x0088
  • [121] JUMP
  • [122] JUMPDEST
  • [123] SWAP3
  • [124] SWAP2
  • [125] POP
  • [126] POP
  • [127] JUMP
  • [128] JUMPDEST
  • [129] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
  • [130] PUSH0 0x
  • [131] MSTORE
  • [132] PUSH1 0x11
  • [133] PUSH1 0x04
  • [134] MSTORE
  • [135] PUSH1 0x24
  • [136] PUSH0 0x
  • [137] REVERT
  • [138] JUMPDEST
  • [139] PUSH0 0x
  • [140] PUSH2 0x00e7
  • [141] DUP3
  • [142] PUSH2 0x007f
  • [143] JUMP
  • [144] JUMPDEST
  • [145] SWAP2
  • [146] POP
  • [147] PUSH2 0x00f2
  • [148] DUP4
  • [149] PUSH2 0x007f
  • [150] JUMP
  • [151] JUMPDEST
  • [152] SWAP3
  • [153] POP
  • [154] DUP3
  • [155] DUP3
  • [156] ADD
  • [157] SWAP1
  • [158] POP
  • [159] DUP1
  • [160] DUP3
  • [161] GT
  • [162] ISZERO
  • [163] PUSH2 0x010a
  • [164] JUMPI
  • [165] PUSH2 0x0109
  • [166] PUSH2 0x00b0
  • [167] JUMP
  • [168] JUMPDEST
  • [169] JUMPDEST
  • [170] SWAP3
  • [171] SWAP2
  • [172] POP
  • [173] POP
  • [174] JUMP
  • [175] 'fe'(Unknown Opcode)
  • [176] LOG2
  • [177] PUSH5 0x6970667358
  • [178] '22'(Unknown Opcode)
  • [179] SLT
  • [180] SHA3
  • [181] DUP10
  • [182] '27'(Unknown Opcode)
  • [183] SWAP4
  • [184] 'd1'(Unknown Opcode)
  • [185] SWAP15
  • [186] CHAINID
  • [187] SWAP13
  • [188] 'a6'(Unknown Opcode)
  • [189] '2d'(Unknown Opcode)
  • [190] MSTORE
  • [191] BLOCKHASH
  • [192] PUSH22 0x2b3199d5a80b6bf517f30b22257cc3464bae6ab46473