APE Price: $0.63 (-1.23%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] DUP1
  • [2] PUSH1 0x40
  • [3] MSTORE
  • [4] PUSH1 0x04
  • [5] CALLDATASIZE
  • [6] LT
  • [7] ISZERO
  • [8] PUSH2 0x0012
  • [9] JUMPI
  • [10] PUSH0 0x
  • [11] DUP1
  • [12] REVERT
  • [13] JUMPDEST
  • [14] PUSH0 0x
  • [15] CALLDATALOAD
  • [16] PUSH1 0xe0
  • [17] SHR
  • [18] SWAP1
  • [19] DUP2
  • [20] PUSH4 0x01ffc9a7
  • [21] EQ
  • [22] PUSH2 0x014f
  • [23] JUMPI
  • [24] POP
  • [25] PUSH4 0xe1c7392a
  • [26] EQ
  • [27] PUSH2 0x0032
  • [28] JUMPI
  • [29] PUSH0 0x
  • [30] DUP1
  • [31] REVERT
  • [32] JUMPDEST
  • [33] CALLVALUE
  • [34] PUSH2 0x014b
  • [35] JUMPI
  • [36] PUSH0 0x
  • [37] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
  • [38] CALLDATASIZE
  • [39] ADD
  • [40] SLT
  • [41] PUSH2 0x014b
  • [42] JUMPI
  • [43] PUSH32 0xfc606c433378e3a7e0a6a531deac289b66caa1b4aa8554fd4ab2c6f1570f92d8
  • [44] PUSH1 0x20
  • [45] MSTORE
  • [46] PUSH32 0x3df35b507c5de77f483b4e9b5c258409299a2e6dc816fa76a389e598628b08a5
  • [47] DUP1
  • [48] SLOAD
  • [49] PUSH1 0x01
  • [50] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00
  • [51] SWAP2
  • [52] DUP3
  • [53] AND
  • [54] DUP2
  • [55] OR
  • [56] SWAP1
  • [57] SWAP3
  • [58] SSTORE
  • [59] PUSH32 0x60a01d96bfd23bf40fe51a144217c96c1b2f06ef00c1ef3a85e3897c08bba011
  • [60] DUP1
  • [61] SLOAD
  • [62] DUP3
  • [63] AND
  • [64] DUP4
  • [65] OR
  • [66] SWAP1
  • [67] SSTORE
  • [68] PUSH32 0x1626ba7e00000000000000000000000000000000000000000000000000000000
  • [69] PUSH0 0x
  • [70] MSTORE
  • [71] PUSH32 0xbb032101562f4f34add14f434b2edb9fe058625d56e214fba6ed514bccfea5b4
  • [72] DUP1
  • [73] SLOAD
  • [74] SWAP1
  • [75] SWAP2
  • [76] AND
  • [77] SWAP1
  • [78] SWAP2
  • [79] OR
  • [80] SWAP1
  • [81] SSTORE
  • [82] STOP
  • [83] JUMPDEST
  • [84] PUSH0 0x
  • [85] DUP1
  • [86] REVERT
  • [87] JUMPDEST
  • [88] CALLVALUE
  • [89] PUSH2 0x014b
  • [90] JUMPI
  • [91] PUSH1 0x20
  • [92] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
  • [93] CALLDATASIZE
  • [94] ADD
  • [95] SLT
  • [96] PUSH2 0x014b
  • [97] JUMPI
  • [98] PUSH1 0x04
  • [99] CALLDATALOAD
  • [100] SWAP1
  • [101] PUSH32 0xffffffff00000000000000000000000000000000000000000000000000000000
  • [102] DUP3
  • [103] AND
  • [104] DUP1
  • [105] SWAP3
  • [106] SUB
  • [107] PUSH2 0x014b
  • [108] JUMPI
  • [109] PUSH1 0x20
  • [110] SWAP2
  • [111] PUSH0 0x
  • [112] MSTORE
  • [113] PUSH32 0xfc606c433378e3a7e0a6a531deac289b66caa1b4aa8554fd4ab2c6f1570f92d8
  • [114] DUP3
  • [115] MSTORE
  • [116] PUSH1 0xff
  • [117] PUSH1 0x40
  • [118] PUSH0 0x
  • [119] SHA3
  • [120] SLOAD
  • [121] AND
  • [122] ISZERO
  • [123] ISZERO
  • [124] DUP2
  • [125] MSTORE
  • [126] RETURN
  • [127] 'fe'(Unknown Opcode)
  • [128] LOG1
  • [129] PUSH5 0x736f6c6343
  • [130] STOP
  • [131] ADDMOD
  • [132] SHR
  • [133] STOP
  • [134] EXP