APE Price: $0.75 (+10.25%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x04
  • [4] CALLDATASIZE
  • [5] LT
  • [6] PUSH2 0x001d
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] CALLDATALOAD
  • [10] PUSH1 0xe0
  • [11] SHR
  • [12] DUP1
  • [13] PUSH4 0x3e58c58c
  • [14] EQ
  • [15] PUSH2 0x0021
  • [16] JUMPI
  • [17] JUMPDEST
  • [18] PUSH0 0x
  • [19] DUP1
  • [20] REVERT
  • [21] JUMPDEST
  • [22] PUSH2 0x003b
  • [23] PUSH1 0x04
  • [24] DUP1
  • [25] CALLDATASIZE
  • [26] SUB
  • [27] DUP2
  • [28] ADD
  • [29] SWAP1
  • [30] PUSH2 0x0036
  • [31] SWAP2
  • [32] SWAP1
  • [33] PUSH2 0x00e7
  • [34] JUMP
  • [35] JUMPDEST
  • [36] PUSH2 0x003d
  • [37] JUMP
  • [38] JUMPDEST
  • [39] STOP
  • [40] JUMPDEST
  • [41] PUSH0 0x
  • [42] DUP2
  • [43] SWAP1
  • [44] POP
  • [45] DUP1
  • [46] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [47] AND
  • [48] PUSH2 0x08fc
  • [49] CALLVALUE
  • [50] SWAP1
  • [51] DUP2
  • [52] ISZERO
  • [53] MUL
  • [54] SWAP1
  • [55] PUSH1 0x40
  • [56] MLOAD
  • [57] PUSH0 0x
  • [58] PUSH1 0x40
  • [59] MLOAD
  • [60] DUP1
  • [61] DUP4
  • [62] SUB
  • [63] DUP2
  • [64] DUP6
  • [65] DUP9
  • [66] DUP9
  • [67] CALL
  • [68] SWAP4
  • [69] POP
  • [70] POP
  • [71] POP
  • [72] POP
  • [73] ISZERO
  • [74] DUP1
  • [75] ISZERO
  • [76] PUSH2 0x0084
  • [77] JUMPI
  • [78] RETURNDATASIZE
  • [79] PUSH0 0x
  • [80] DUP1
  • [81] RETURNDATACOPY
  • [82] RETURNDATASIZE
  • [83] PUSH0 0x
  • [84] REVERT
  • [85] JUMPDEST
  • [86] POP
  • [87] POP
  • [88] POP
  • [89] JUMP
  • [90] JUMPDEST
  • [91] PUSH0 0x
  • [92] DUP1
  • [93] REVERT
  • [94] JUMPDEST
  • [95] PUSH0 0x
  • [96] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [97] DUP3
  • [98] AND
  • [99] SWAP1
  • [100] POP
  • [101] SWAP2
  • [102] SWAP1
  • [103] POP
  • [104] JUMP
  • [105] JUMPDEST
  • [106] PUSH0 0x
  • [107] PUSH2 0x00b6
  • [108] DUP3
  • [109] PUSH2 0x008d
  • [110] JUMP
  • [111] JUMPDEST
  • [112] SWAP1
  • [113] POP
  • [114] SWAP2
  • [115] SWAP1
  • [116] POP
  • [117] JUMP
  • [118] JUMPDEST
  • [119] PUSH2 0x00c6
  • [120] DUP2
  • [121] PUSH2 0x00ac
  • [122] JUMP
  • [123] JUMPDEST
  • [124] DUP2
  • [125] EQ
  • [126] PUSH2 0x00d0
  • [127] JUMPI
  • [128] PUSH0 0x
  • [129] DUP1
  • [130] REVERT
  • [131] JUMPDEST
  • [132] POP
  • [133] JUMP
  • [134] JUMPDEST
  • [135] PUSH0 0x
  • [136] DUP2
  • [137] CALLDATALOAD
  • [138] SWAP1
  • [139] POP
  • [140] PUSH2 0x00e1
  • [141] DUP2
  • [142] PUSH2 0x00bd
  • [143] JUMP
  • [144] JUMPDEST
  • [145] SWAP3
  • [146] SWAP2
  • [147] POP
  • [148] POP
  • [149] JUMP
  • [150] JUMPDEST
  • [151] PUSH0 0x
  • [152] PUSH1 0x20
  • [153] DUP3
  • [154] DUP5
  • [155] SUB
  • [156] SLT
  • [157] ISZERO
  • [158] PUSH2 0x00fc
  • [159] JUMPI
  • [160] PUSH2 0x00fb
  • [161] PUSH2 0x0089
  • [162] JUMP
  • [163] JUMPDEST
  • [164] JUMPDEST
  • [165] PUSH0 0x
  • [166] PUSH2 0x0109
  • [167] DUP5
  • [168] DUP3
  • [169] DUP6
  • [170] ADD
  • [171] PUSH2 0x00d3
  • [172] JUMP
  • [173] JUMPDEST
  • [174] SWAP2
  • [175] POP
  • [176] POP
  • [177] SWAP3
  • [178] SWAP2
  • [179] POP
  • [180] POP
  • [181] JUMP
  • [182] 'fe'(Unknown Opcode)
  • [183] LOG2
  • [184] PUSH5 0x6970667358
  • [185] '22'(Unknown Opcode)
  • [186] SLT
  • [187] SHA3
  • [188] LOG0
  • [189] PUSH27 0xf41212c4028d918c0f97062a05af5270900cd01dcec53161aecf74
  • [190] '25'(Unknown Opcode)
  • [191] 'c4'(Unknown Opcode)
  • [192] 'a6'(Unknown Opcode)
  • [193] PUSH5 0x736f6c6343
  • [194] STOP
  • [195] ADDMOD
  • [196] BYTE
  • [197] STOP
  • [198] CALLER