Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] PUSH1 0x04
- [4] CALLDATASIZE
- [5] LT
- [6] ISZERO
- [7] PUSH2 0x0012
- [8] JUMPI
- [9] PUSH1 0x00
- [10] DUP1
- [11] REVERT
- [12] JUMPDEST
- [13] PUSH1 0x00
- [14] DUP1
- [15] CALLDATALOAD
- [16] PUSH1 0xe0
- [17] SHR
- [18] DUP1
- [19] PUSH4 0x3659cfe6
- [20] EQ
- [21] PUSH2 0x02ce
- [22] JUMPI
- [23] DUP1
- [24] PUSH4 0x5c60da1b
- [25] EQ
- [26] PUSH2 0x027c
- [27] JUMPI
- [28] DUP1
- [29] PUSH4 0x715018a6
- [30] EQ
- [31] PUSH2 0x01e0
- [32] JUMPI
- [33] DUP1
- [34] PUSH4 0x8da5cb5b
- [35] EQ
- [36] PUSH2 0x018f
- [37] JUMPI
- [38] PUSH4 0xf2fde38b
- [39] EQ
- [40] PUSH2 0x0054
- [41] JUMPI
- [42] PUSH1 0x00
- [43] DUP1
- [44] REVERT
- [45] JUMPDEST
- [46] CALLVALUE
- [47] PUSH2 0x018c
- [48] JUMPI
- [49] PUSH1 0x20
- [50] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
- [51] CALLDATASIZE
- [52] ADD
- [53] SLT
- [54] PUSH2 0x018c
- [55] JUMPI
- [56] PUSH1 0x04
- [57] CALLDATALOAD
- [58] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [59] DUP1
- [60] DUP3
- [61] AND
- [62] DUP1
- [63] SWAP3
- [64] SUB
- [65] PUSH2 0x0188
- [66] JUMPI
- [67] PUSH2 0x00ad
- [68] PUSH2 0x0403
- [69] JUMP
- [70] JUMPDEST
- [71] DUP2
- [72] ISZERO
- [73] PUSH2 0x0104
- [74] JUMPI
- [75] DUP3
- [76] SLOAD
- [77] DUP3
- [78] PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
- [79] DUP3
- [80] AND
- [81] OR
- [82] DUP5
- [83] SSTORE
- [84] AND
- [85] PUSH32 0x8be0079c531659141344cd1fd0a4f28419497f9722a3daafe3b4186f6b6457e0
- [86] DUP4
- [87] DUP1
- [88] LOG3
- [89] DUP1
- [90] RETURN
- [91] JUMPDEST
- [92] PUSH1 0x84
- [93] PUSH1 0x40
- [94] MLOAD
- [95] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
- [96] DUP2
- [97] MSTORE
- [98] PUSH1 0x20
- [99] PUSH1 0x04
- [100] DUP3
- [101] ADD
- [102] MSTORE
- [103] PUSH1 0x26
- [104] PUSH1 0x24
- [105] DUP3
- [106] ADD
- [107] MSTORE
- [108] PUSH32 0x4f776e61626c653a206e6577206f776e657220697320746865207a65726f2061
- [109] PUSH1 0x44
- [110] DUP3
- [111] ADD
- [112] MSTORE
- [113] PUSH32 0x6464726573730000000000000000000000000000000000000000000000000000
- [114] PUSH1 0x64
- [115] DUP3
- [116] ADD
- [117] MSTORE
- [118] REVERT
- [119] JUMPDEST
- [120] DUP3
- [121] DUP1
- [122] REVERT
- [123] JUMPDEST
- [124] DUP1
- [125] REVERT
- [126] JUMPDEST
- [127] POP
- [128] CALLVALUE
- [129] PUSH2 0x018c
- [130] JUMPI
- [131] DUP1
- [132] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
- [133] CALLDATASIZE
- [134] ADD
- [135] SLT
- [136] PUSH2 0x018c
- [137] JUMPI
- [138] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [139] PUSH1 0x20
- [140] SWAP2
- [141] SLOAD
- [142] AND
- [143] PUSH1 0x40
- [144] MLOAD
- [145] SWAP1
- [146] DUP2
- [147] MSTORE
- [148] RETURN
- [149] JUMPDEST
- [150] POP
- [151] CALLVALUE
- [152] PUSH2 0x018c
- [153] JUMPI
- [154] DUP1
- [155] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
- [156] CALLDATASIZE
- [157] ADD
- [158] SLT
- [159] PUSH2 0x018c
- [160] JUMPI
- [161] PUSH2 0x0217
- [162] PUSH2 0x0403
- [163] JUMP
- [164] JUMPDEST
- [165] DUP1
- [166] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [167] DUP2
- [168] SLOAD
- [169] PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
- [170] DUP2
- [171] AND
- [172] DUP4
- [173] SSTORE
- [174] AND
- [175] PUSH32 0x8be0079c531659141344cd1fd0a4f28419497f9722a3daafe3b4186f6b6457e0
- [176] DUP3
- [177] DUP1
- [178] LOG3
- [179] DUP1
- [180] RETURN
- [181] JUMPDEST
- [182] POP
- [183] CALLVALUE
- [184] PUSH2 0x018c
- [185] JUMPI
- [186] DUP1
- [187] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
- [188] CALLDATASIZE
- [189] ADD
- [190] SLT
- [191] PUSH2 0x018c
- [192] JUMPI
- [193] PUSH1 0x20
- [194] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [195] PUSH1 0x01
- [196] SLOAD
- [197] AND
- [198] PUSH1 0x40
- [199] MLOAD
- [200] SWAP1
- [201] DUP2
- [202] MSTORE
- [203] RETURN
- [204] JUMPDEST
- [205] POP
- [206] CALLVALUE
- [207] PUSH2 0x018c
- [208] JUMPI
- [209] PUSH1 0x20
- [210] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
- [211] CALLDATASIZE
- [212] ADD
- [213] SLT
- [214] PUSH2 0x018c
- [215] JUMPI
- [216] PUSH1 0x04
- [217] CALLDATALOAD
- [218] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [219] DUP2
- [220] AND
- [221] SWAP1
- [222] DUP2
- [223] DUP2
- [224] SUB
- [225] PUSH2 0x0188
- [226] JUMPI
- [227] PUSH2 0x0328
- [228] PUSH2 0x0403
- [229] JUMP
- [230] JUMPDEST
- [231] EXTCODESIZE
- [232] ISZERO
- [233] PUSH2 0x037f
- [234] JUMPI
- [235] DUP1
- [236] PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
- [237] PUSH1 0x01
- [238] SLOAD
- [239] AND
- [240] OR
- [241] PUSH1 0x01
- [242] SSTORE
- [243] PUSH32 0xbc7cd75a20ee27fd9adebab32041f755214dbc6bffa90cc0225b39da2e5c2d3b
- [244] DUP3
- [245] DUP1
- [246] LOG2
- [247] DUP1
- [248] RETURN
- [249] JUMPDEST
- [250] PUSH1 0x84
- [251] PUSH1 0x40
- [252] MLOAD
- [253] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
- [254] DUP2
- [255] MSTORE
- [256] PUSH1 0x20
- [257] PUSH1 0x04
- [258] DUP3
- [259] ADD
- [260] MSTORE
- [261] PUSH1 0x33
- [262] PUSH1 0x24
- [263] DUP3
- [264] ADD
- [265] MSTORE
- [266] PUSH32 0x5570677261646561626c65426561636f6e3a20696d706c656d656e746174696f
- [267] PUSH1 0x44
- [268] DUP3
- [269] ADD
- [270] MSTORE
- [271] PUSH32 0x6e206973206e6f74206120636f6e747261637400000000000000000000000000
- [272] PUSH1 0x64
- [273] DUP3
- [274] ADD
- [275] MSTORE
- [276] REVERT
- [277] JUMPDEST
- [278] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [279] PUSH1 0x00
- [280] SLOAD
- [281] AND
- [282] CALLER
- [283] SUB
- [284] PUSH2 0x0424
- [285] JUMPI
- [286] JUMP
- [287] JUMPDEST
- [288] PUSH1 0x64
- [289] PUSH1 0x40
- [290] MLOAD
- [291] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
- [292] DUP2
- [293] MSTORE
- [294] PUSH1 0x20
- [295] PUSH1 0x04
- [296] DUP3
- [297] ADD
- [298] MSTORE
- [299] PUSH1 0x20
- [300] PUSH1 0x24
- [301] DUP3
- [302] ADD
- [303] MSTORE
- [304] PUSH32 0x4f776e61626c653a2063616c6c6572206973206e6f7420746865206f776e6572
- [305] PUSH1 0x44
- [306] DUP3
- [307] ADD
- [308] MSTORE
- [309] REVERT
- [310] 'fe'(Unknown Opcode)
- [311] LOG2
- [312] PUSH5 0x6970667358
- [313] '22'(Unknown Opcode)
- [314] SLT
- [315] SHA3
- [316] 'ee'(Unknown Opcode)
- [317] MUL
- [318] 'a7'(Unknown Opcode)
- [319] 'cc'(Unknown Opcode)
- [320] SWAP11
- [321] 'da'(Unknown Opcode)
- [322] 'e6'(Unknown Opcode)
- [323] DUP6
- [324] PUSH5 0xfeda649341
- [325] PUSH17 0xf02f3f12a55b74647721baba4fb3661571
- [326] PUSH5 0x736f6c6343
- [327] STOP
- [328] ADDMOD
- [329] SGT
- [330] STOP
- [331] CALLER