APE Price: $0.68 (-5.80%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH1 0x0e
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH1 0x30
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x09e96008
  • [24] EQ
  • [25] PUSH1 0x34
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0x2a1afcd9
  • [29] EQ
  • [30] PUSH1 0x4c
  • [31] JUMPI
  • [32] JUMPDEST
  • [33] PUSH0 0x
  • [34] DUP1
  • [35] REVERT
  • [36] JUMPDEST
  • [37] PUSH1 0x4a
  • [38] PUSH1 0x04
  • [39] DUP1
  • [40] CALLDATASIZE
  • [41] SUB
  • [42] DUP2
  • [43] ADD
  • [44] SWAP1
  • [45] PUSH1 0x46
  • [46] SWAP2
  • [47] SWAP1
  • [48] PUSH1 0xa6
  • [49] JUMP
  • [50] JUMPDEST
  • [51] PUSH1 0x66
  • [52] JUMP
  • [53] JUMPDEST
  • [54] STOP
  • [55] JUMPDEST
  • [56] PUSH1 0x52
  • [57] PUSH1 0x6f
  • [58] JUMP
  • [59] JUMPDEST
  • [60] PUSH1 0x40
  • [61] MLOAD
  • [62] PUSH1 0x5d
  • [63] SWAP2
  • [64] SWAP1
  • [65] PUSH1 0xd9
  • [66] JUMP
  • [67] JUMPDEST
  • [68] PUSH1 0x40
  • [69] MLOAD
  • [70] DUP1
  • [71] SWAP2
  • [72] SUB
  • [73] SWAP1
  • [74] RETURN
  • [75] JUMPDEST
  • [76] DUP1
  • [77] PUSH0 0x
  • [78] DUP2
  • [79] SWAP1
  • [80] SSTORE
  • [81] POP
  • [82] POP
  • [83] JUMP
  • [84] JUMPDEST
  • [85] PUSH0 0x
  • [86] SLOAD
  • [87] DUP2
  • [88] JUMP
  • [89] JUMPDEST
  • [90] PUSH0 0x
  • [91] DUP1
  • [92] REVERT
  • [93] JUMPDEST
  • [94] PUSH0 0x
  • [95] DUP2
  • [96] SWAP1
  • [97] POP
  • [98] SWAP2
  • [99] SWAP1
  • [100] POP
  • [101] JUMP
  • [102] JUMPDEST
  • [103] PUSH1 0x88
  • [104] DUP2
  • [105] PUSH1 0x78
  • [106] JUMP
  • [107] JUMPDEST
  • [108] DUP2
  • [109] EQ
  • [110] PUSH1 0x91
  • [111] JUMPI
  • [112] PUSH0 0x
  • [113] DUP1
  • [114] REVERT
  • [115] JUMPDEST
  • [116] POP
  • [117] JUMP
  • [118] JUMPDEST
  • [119] PUSH0 0x
  • [120] DUP2
  • [121] CALLDATALOAD
  • [122] SWAP1
  • [123] POP
  • [124] PUSH1 0xa0
  • [125] DUP2
  • [126] PUSH1 0x81
  • [127] JUMP
  • [128] JUMPDEST
  • [129] SWAP3
  • [130] SWAP2
  • [131] POP
  • [132] POP
  • [133] JUMP
  • [134] JUMPDEST
  • [135] PUSH0 0x
  • [136] PUSH1 0x20
  • [137] DUP3
  • [138] DUP5
  • [139] SUB
  • [140] SLT
  • [141] ISZERO
  • [142] PUSH1 0xb8
  • [143] JUMPI
  • [144] PUSH1 0xb7
  • [145] PUSH1 0x74
  • [146] JUMP
  • [147] JUMPDEST
  • [148] JUMPDEST
  • [149] PUSH0 0x
  • [150] PUSH1 0xc3
  • [151] DUP5
  • [152] DUP3
  • [153] DUP6
  • [154] ADD
  • [155] PUSH1 0x94
  • [156] JUMP
  • [157] JUMPDEST
  • [158] SWAP2
  • [159] POP
  • [160] POP
  • [161] SWAP3
  • [162] SWAP2
  • [163] POP
  • [164] POP
  • [165] JUMP
  • [166] JUMPDEST
  • [167] PUSH1 0xd3
  • [168] DUP2
  • [169] PUSH1 0x78
  • [170] JUMP
  • [171] JUMPDEST
  • [172] DUP3
  • [173] MSTORE
  • [174] POP
  • [175] POP
  • [176] JUMP
  • [177] JUMPDEST
  • [178] PUSH0 0x
  • [179] PUSH1 0x20
  • [180] DUP3
  • [181] ADD
  • [182] SWAP1
  • [183] POP
  • [184] PUSH1 0xea
  • [185] PUSH0 0x
  • [186] DUP4
  • [187] ADD
  • [188] DUP5
  • [189] PUSH1 0xcc
  • [190] JUMP
  • [191] JUMPDEST
  • [192] SWAP3
  • [193] SWAP2
  • [194] POP
  • [195] POP
  • [196] JUMP
  • [197] 'fe'(Unknown Opcode)
  • [198] LOG2
  • [199] PUSH5 0x6970667358
  • [200] '22'(Unknown Opcode)
  • [201] SLT
  • [202] SHA3
  • [203] PUSH13 0x21507eab3db11785283ac896d6
  • [204] ADDMOD
  • [205] 'd6'(Unknown Opcode)
  • [206] DUP5
  • [207] 'e7'(Unknown Opcode)
  • [208] 'e5'(Unknown Opcode)
  • [209] NUMBER
  • [210] SWAP14
  • [211] 'bc'(Unknown Opcode)
  • [212] SAR
  • [213] 'c9'(Unknown Opcode)
  • [214] SELFBALANCE
  • [215] '4f'(Unknown Opcode)
  • [216] 'ca'(Unknown Opcode)