Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLVALUE
- [4] DUP1
- [5] ISZERO
- [6] PUSH2 0x000f
- [7] JUMPI
- [8] PUSH0 0x
- [9] DUP1
- [10] REVERT
- [11] JUMPDEST
- [12] POP
- [13] PUSH1 0x04
- [14] CALLDATASIZE
- [15] LT
- [16] PUSH2 0x0055
- [17] JUMPI
- [18] PUSH0 0x
- [19] CALLDATALOAD
- [20] PUSH1 0xe0
- [21] SHR
- [22] DUP1
- [23] PUSH4 0x06661abd
- [24] EQ
- [25] PUSH2 0x0059
- [26] JUMPI
- [27] DUP1
- [28] PUSH4 0x2baeceb7
- [29] EQ
- [30] PUSH2 0x0077
- [31] JUMPI
- [32] DUP1
- [33] PUSH4 0xd09de08a
- [34] EQ
- [35] PUSH2 0x0081
- [36] JUMPI
- [37] DUP1
- [38] PUSH4 0xd14e62b8
- [39] EQ
- [40] PUSH2 0x008b
- [41] JUMPI
- [42] DUP1
- [43] PUSH4 0xd826f88f
- [44] EQ
- [45] PUSH2 0x00a7
- [46] JUMPI
- [47] JUMPDEST
- [48] PUSH0 0x
- [49] DUP1
- [50] REVERT
- [51] JUMPDEST
- [52] PUSH2 0x0061
- [53] PUSH2 0x00b1
- [54] JUMP
- [55] JUMPDEST
- [56] PUSH1 0x40
- [57] MLOAD
- [58] PUSH2 0x006e
- [59] SWAP2
- [60] SWAP1
- [61] PUSH2 0x0156
- [62] JUMP
- [63] JUMPDEST
- [64] PUSH1 0x40
- [65] MLOAD
- [66] DUP1
- [67] SWAP2
- [68] SUB
- [69] SWAP1
- [70] RETURN
- [71] JUMPDEST
- [72] PUSH2 0x007f
- [73] PUSH2 0x00b6
- [74] JUMP
- [75] JUMPDEST
- [76] STOP
- [77] JUMPDEST
- [78] PUSH2 0x0089
- [79] PUSH2 0x0113
- [80] JUMP
- [81] JUMPDEST
- [82] STOP
- [83] JUMPDEST
- [84] PUSH2 0x00a5
- [85] PUSH1 0x04
- [86] DUP1
- [87] CALLDATASIZE
- [88] SUB
- [89] DUP2
- [90] ADD
- [91] SWAP1
- [92] PUSH2 0x00a0
- [93] SWAP2
- [94] SWAP1
- [95] PUSH2 0x019d
- [96] JUMP
- [97] JUMPDEST
- [98] PUSH2 0x012d
- [99] JUMP
- [100] JUMPDEST
- [101] STOP
- [102] JUMPDEST
- [103] PUSH2 0x00af
- [104] PUSH2 0x0136
- [105] JUMP
- [106] JUMPDEST
- [107] STOP
- [108] JUMPDEST
- [109] PUSH0 0x
- [110] SLOAD
- [111] DUP2
- [112] JUMP
- [113] JUMPDEST
- [114] PUSH0 0x
- [115] DUP1
- [116] SLOAD
- [117] GT
- [118] PUSH2 0x00f9
- [119] JUMPI
- [120] PUSH1 0x40
- [121] MLOAD
- [122] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
- [123] DUP2
- [124] MSTORE
- [125] PUSH1 0x04
- [126] ADD
- [127] PUSH2 0x00f0
- [128] SWAP1
- [129] PUSH2 0x0222
- [130] JUMP
- [131] JUMPDEST
- [132] PUSH1 0x40
- [133] MLOAD
- [134] DUP1
- [135] SWAP2
- [136] SUB
- [137] SWAP1
- [138] REVERT
- [139] JUMPDEST
- [140] PUSH1 0x01
- [141] PUSH0 0x
- [142] DUP1
- [143] DUP3
- [144] DUP3
- [145] SLOAD
- [146] PUSH2 0x010a
- [147] SWAP2
- [148] SWAP1
- [149] PUSH2 0x026d
- [150] JUMP
- [151] JUMPDEST
- [152] SWAP3
- [153] POP
- [154] POP
- [155] DUP2
- [156] SWAP1
- [157] SSTORE
- [158] POP
- [159] JUMP
- [160] JUMPDEST
- [161] PUSH1 0x01
- [162] PUSH0 0x
- [163] DUP1
- [164] DUP3
- [165] DUP3
- [166] SLOAD
- [167] PUSH2 0x0124
- [168] SWAP2
- [169] SWAP1
- [170] PUSH2 0x02a0
- [171] JUMP
- [172] JUMPDEST
- [173] SWAP3
- [174] POP
- [175] POP
- [176] DUP2
- [177] SWAP1
- [178] SSTORE
- [179] POP
- [180] JUMP
- [181] JUMPDEST
- [182] DUP1
- [183] PUSH0 0x
- [184] DUP2
- [185] SWAP1
- [186] SSTORE
- [187] POP
- [188] POP
- [189] JUMP
- [190] JUMPDEST
- [191] PUSH0 0x
- [192] DUP1
- [193] DUP2
- [194] SWAP1
- [195] SSTORE
- [196] POP
- [197] JUMP
- [198] JUMPDEST
- [199] PUSH0 0x
- [200] DUP2
- [201] SWAP1
- [202] POP
- [203] SWAP2
- [204] SWAP1
- [205] POP
- [206] JUMP
- [207] JUMPDEST
- [208] PUSH2 0x0150
- [209] DUP2
- [210] PUSH2 0x013e
- [211] JUMP
- [212] JUMPDEST
- [213] DUP3
- [214] MSTORE
- [215] POP
- [216] POP
- [217] JUMP
- [218] JUMPDEST
- [219] PUSH0 0x
- [220] PUSH1 0x20
- [221] DUP3
- [222] ADD
- [223] SWAP1
- [224] POP
- [225] PUSH2 0x0169
- [226] PUSH0 0x
- [227] DUP4
- [228] ADD
- [229] DUP5
- [230] PUSH2 0x0147
- [231] JUMP
- [232] JUMPDEST
- [233] SWAP3
- [234] SWAP2
- [235] POP
- [236] POP
- [237] JUMP
- [238] JUMPDEST
- [239] PUSH0 0x
- [240] DUP1
- [241] REVERT
- [242] JUMPDEST
- [243] PUSH2 0x017c
- [244] DUP2
- [245] PUSH2 0x013e
- [246] JUMP
- [247] JUMPDEST
- [248] DUP2
- [249] EQ
- [250] PUSH2 0x0186
- [251] JUMPI
- [252] PUSH0 0x
- [253] DUP1
- [254] REVERT
- [255] JUMPDEST
- [256] POP
- [257] JUMP
- [258] JUMPDEST
- [259] PUSH0 0x
- [260] DUP2
- [261] CALLDATALOAD
- [262] SWAP1
- [263] POP
- [264] PUSH2 0x0197
- [265] DUP2
- [266] PUSH2 0x0173
- [267] JUMP
- [268] JUMPDEST
- [269] SWAP3
- [270] SWAP2
- [271] POP
- [272] POP
- [273] JUMP
- [274] JUMPDEST
- [275] PUSH0 0x
- [276] PUSH1 0x20
- [277] DUP3
- [278] DUP5
- [279] SUB
- [280] SLT
- [281] ISZERO
- [282] PUSH2 0x01b2
- [283] JUMPI
- [284] PUSH2 0x01b1
- [285] PUSH2 0x016f
- [286] JUMP
- [287] JUMPDEST
- [288] JUMPDEST
- [289] PUSH0 0x
- [290] PUSH2 0x01bf
- [291] DUP5
- [292] DUP3
- [293] DUP6
- [294] ADD
- [295] PUSH2 0x0189
- [296] JUMP
- [297] JUMPDEST
- [298] SWAP2
- [299] POP
- [300] POP
- [301] SWAP3
- [302] SWAP2
- [303] POP
- [304] POP
- [305] JUMP
- [306] JUMPDEST
- [307] PUSH0 0x
- [308] DUP3
- [309] DUP3
- [310] MSTORE
- [311] PUSH1 0x20
- [312] DUP3
- [313] ADD
- [314] SWAP1
- [315] POP
- [316] SWAP3
- [317] SWAP2
- [318] POP
- [319] POP
- [320] JUMP
- [321] JUMPDEST
- [322] PUSH32 0x436f756e7465722063616e6e6f7420676f2062656c6f77207a65726f00000000
- [323] PUSH0 0x
- [324] DUP3
- [325] ADD
- [326] MSTORE
- [327] POP
- [328] JUMP
- [329] JUMPDEST
- [330] PUSH0 0x
- [331] PUSH2 0x020c
- [332] PUSH1 0x1c
- [333] DUP4
- [334] PUSH2 0x01c8
- [335] JUMP
- [336] JUMPDEST
- [337] SWAP2
- [338] POP
- [339] PUSH2 0x0217
- [340] DUP3
- [341] PUSH2 0x01d8
- [342] JUMP
- [343] JUMPDEST
- [344] PUSH1 0x20
- [345] DUP3
- [346] ADD
- [347] SWAP1
- [348] POP
- [349] SWAP2
- [350] SWAP1
- [351] POP
- [352] JUMP
- [353] JUMPDEST
- [354] PUSH0 0x
- [355] PUSH1 0x20
- [356] DUP3
- [357] ADD
- [358] SWAP1
- [359] POP
- [360] DUP2
- [361] DUP2
- [362] SUB
- [363] PUSH0 0x
- [364] DUP4
- [365] ADD
- [366] MSTORE
- [367] PUSH2 0x0239
- [368] DUP2
- [369] PUSH2 0x0200
- [370] JUMP
- [371] JUMPDEST
- [372] SWAP1
- [373] POP
- [374] SWAP2
- [375] SWAP1
- [376] POP
- [377] JUMP
- [378] JUMPDEST
- [379] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
- [380] PUSH0 0x
- [381] MSTORE
- [382] PUSH1 0x11
- [383] PUSH1 0x04
- [384] MSTORE
- [385] PUSH1 0x24
- [386] PUSH0 0x
- [387] REVERT
- [388] JUMPDEST
- [389] PUSH0 0x
- [390] PUSH2 0x0277
- [391] DUP3
- [392] PUSH2 0x013e
- [393] JUMP
- [394] JUMPDEST
- [395] SWAP2
- [396] POP
- [397] PUSH2 0x0282
- [398] DUP4
- [399] PUSH2 0x013e
- [400] JUMP
- [401] JUMPDEST
- [402] SWAP3
- [403] POP
- [404] DUP3
- [405] DUP3
- [406] SUB
- [407] SWAP1
- [408] POP
- [409] DUP2
- [410] DUP2
- [411] GT
- [412] ISZERO
- [413] PUSH2 0x029a
- [414] JUMPI
- [415] PUSH2 0x0299
- [416] PUSH2 0x0240
- [417] JUMP
- [418] JUMPDEST
- [419] JUMPDEST
- [420] SWAP3
- [421] SWAP2
- [422] POP
- [423] POP
- [424] JUMP
- [425] JUMPDEST
- [426] PUSH0 0x
- [427] PUSH2 0x02aa
- [428] DUP3
- [429] PUSH2 0x013e
- [430] JUMP
- [431] JUMPDEST
- [432] SWAP2
- [433] POP
- [434] PUSH2 0x02b5
- [435] DUP4
- [436] PUSH2 0x013e
- [437] JUMP
- [438] JUMPDEST
- [439] SWAP3
- [440] POP
- [441] DUP3
- [442] DUP3
- [443] ADD
- [444] SWAP1
- [445] POP
- [446] DUP1
- [447] DUP3
- [448] GT
- [449] ISZERO
- [450] PUSH2 0x02cd
- [451] JUMPI
- [452] PUSH2 0x02cc
- [453] PUSH2 0x0240
- [454] JUMP
- [455] JUMPDEST
- [456] JUMPDEST
- [457] SWAP3
- [458] SWAP2
- [459] POP
- [460] POP
- [461] JUMP
- [462] 'fe'(Unknown Opcode)
- [463] LOG2
- [464] PUSH5 0x6970667358
- [465] '22'(Unknown Opcode)
- [466] SLT
- [467] SHA3
- [468] LT
- [469] '4b'(Unknown Opcode)
- [470] PUSH3 0xf167a1
- [471] 'c4'(Unknown Opcode)
- [472] DELEGATECALL
- [473] 'd5'(Unknown Opcode)
- [474] CALLDATALOAD
- [475] PUSH27 0x2e82e5562e1dc3a43eb8739dbcff378bc0c954426264736f6c6343
- [476] STOP
- [477] ADDMOD
- [478] BYTE
- [479] STOP
- [480] CALLER