Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] CALLDATASIZE
- [2] ISZERO
- [3] PUSH2 0x01a2
- [4] JUMPI
- [5] PUSH1 0x20
- [6] DUP1
- [7] DUP3
- [8] ADD
- [9] PUSH32 0xc8fcad8db84d3cc18b4c41d551ea0ee66dd599cde068d998e57d5e09332c131b
- [10] DUP2
- [11] MSTORE
- [12] DUP2
- [13] DUP4
- [14] MSTORE
- [15] PUSH1 0x40
- [16] DUP4
- [17] ADD
- [18] SWAP1
- [19] DUP4
- [20] DUP3
- [21] LT
- [22] PUSH8 0xffffffffffffffff
- [23] DUP4
- [24] GT
- [25] OR
- [26] PUSH2 0x0173
- [27] JUMPI
- [28] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00
- [29] SWAP1
- [30] DUP3
- [31] PUSH1 0x40
- [32] MSTORE
- [33] DUP5
- [34] MLOAD
- [35] SWAP1
- [36] SHA3
- [37] AND
- [38] CALLDATASIZE
- [39] PUSH1 0x04
- [40] GT
- [41] PUSH2 0x016e
- [42] JUMPI
- [43] PUSH1 0x00
- [44] SWAP2
- [45] PUSH1 0x03
- [46] PUSH32 0xffffffff00000000000000000000000000000000000000000000000000000000
- [47] DUP5
- [48] CALLDATALOAD
- [49] AND
- [50] SWAP3
- [51] DUP4
- [52] DUP6
- [53] MSTORE
- [54] ADD
- [55] DUP5
- [56] MSTORE
- [57] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [58] PUSH1 0x40
- [59] DUP5
- [60] SHA3
- [61] SLOAD
- [62] AND
- [63] SWAP2
- [64] DUP3
- [65] ISZERO
- [66] PUSH2 0x0140
- [67] JUMPI
- [68] DUP5
- [69] PUSH2 0x0131
- [70] DUP6
- [71] DUP6
- [72] DUP2
- [73] DUP1
- [74] PUSH2 0x00e0
- [75] CALLDATASIZE
- [76] PUSH2 0x01e5
- [77] JUMP
- [78] JUMPDEST
- [79] PUSH2 0x00ed
- [80] PUSH1 0x40
- [81] MLOAD
- [82] SWAP2
- [83] DUP3
- [84] PUSH2 0x01a4
- [85] JUMP
- [86] JUMPDEST
- [87] CALLDATASIZE
- [88] DUP2
- [89] MSTORE
- [90] DUP7
- [91] DUP2
- [92] ADD
- [93] SWAP1
- [94] CALLDATASIZE
- [95] DUP4
- [96] DUP4
- [97] CALLDATACOPY
- [98] DUP3
- [99] DUP9
- [100] CALLDATASIZE
- [101] DUP4
- [102] ADD
- [103] ADD
- [104] MSTORE
- [105] MLOAD
- [106] SWAP1
- [107] DUP5
- [108] GAS
- [109] DELEGATECALL
- [110] SWAP1
- [111] RETURNDATASIZE
- [112] ISZERO
- [113] PUSH2 0x0137
- [114] JUMPI
- [115] RETURNDATASIZE
- [116] PUSH2 0x0115
- [117] DUP2
- [118] PUSH2 0x01e5
- [119] JUMP
- [120] JUMPDEST
- [121] SWAP1
- [122] PUSH2 0x0123
- [123] PUSH1 0x40
- [124] MLOAD
- [125] SWAP3
- [126] DUP4
- [127] PUSH2 0x01a4
- [128] JUMP
- [129] JUMPDEST
- [130] DUP2
- [131] MSTORE
- [132] DUP1
- [133] SWAP4
- [134] DUP7
- [135] RETURNDATASIZE
- [136] SWAP3
- [137] ADD
- [138] RETURNDATACOPY
- [139] PUSH2 0x021f
- [140] JUMP
- [141] JUMPDEST
- [142] DUP1
- [143] MLOAD
- [144] SWAP2
- [145] ADD
- [146] RETURN
- [147] JUMPDEST
- [148] PUSH1 0x60
- [149] SWAP3
- [150] POP
- [151] PUSH2 0x021f
- [152] JUMP
- [153] JUMPDEST
- [154] PUSH1 0x24
- [155] SWAP3
- [156] POP
- [157] PUSH1 0x44
- [158] DUP7
- [159] PUSH32 0x5416eb9800000000000000000000000000000000000000000000000000000000
- [160] DUP5
- [161] MSTORE
- [162] ADD
- [163] MSTORE
- [164] REVERT
- [165] JUMPDEST
- [166] PUSH1 0x00
- [167] DUP1
- [168] REVERT
- [169] JUMPDEST
- [170] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
- [171] PUSH1 0x00
- [172] MSTORE
- [173] PUSH1 0x41
- [174] PUSH1 0x04
- [175] MSTORE
- [176] PUSH1 0x24
- [177] PUSH1 0x00
- [178] REVERT
- [179] JUMPDEST
- [180] STOP
- [181] JUMPDEST
- [182] SWAP1
- [183] PUSH1 0x1f
- [184] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe0
- [185] SWAP2
- [186] ADD
- [187] AND
- [188] DUP2
- [189] ADD
- [190] SWAP1
- [191] DUP2
- [192] LT
- [193] PUSH8 0xffffffffffffffff
- [194] DUP3
- [195] GT
- [196] OR
- [197] PUSH2 0x0173
- [198] JUMPI
- [199] PUSH1 0x40
- [200] MSTORE
- [201] JUMP
- [202] JUMPDEST
- [203] PUSH8 0xffffffffffffffff
- [204] DUP2
- [205] GT
- [206] PUSH2 0x0173
- [207] JUMPI
- [208] PUSH1 0x1f
- [209] ADD
- [210] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe0
- [211] AND
- [212] PUSH1 0x20
- [213] ADD
- [214] SWAP1
- [215] JUMP
- [216] JUMPDEST
- [217] SWAP1
- [218] PUSH2 0x025e
- [219] JUMPI
- [220] POP
- [221] DUP1
- [222] MLOAD
- [223] ISZERO
- [224] PUSH2 0x0234
- [225] JUMPI
- [226] DUP1
- [227] MLOAD
- [228] SWAP1
- [229] PUSH1 0x20
- [230] ADD
- [231] REVERT
- [232] JUMPDEST
- [233] PUSH1 0x04
- [234] PUSH1 0x40
- [235] MLOAD
- [236] PUSH32 0x1425ea4200000000000000000000000000000000000000000000000000000000
- [237] DUP2
- [238] MSTORE
- [239] REVERT
- [240] JUMPDEST
- [241] DUP2
- [242] MLOAD
- [243] ISZERO
- [244] DUP1
- [245] PUSH2 0x02b6
- [246] JUMPI
- [247] JUMPDEST
- [248] PUSH2 0x026f
- [249] JUMPI
- [250] POP
- [251] SWAP1
- [252] JUMP
- [253] JUMPDEST
- [254] PUSH1 0x24
- [255] SWAP1
- [256] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [257] PUSH1 0x40
- [258] MLOAD
- [259] SWAP2
- [260] PUSH32 0x9996b31500000000000000000000000000000000000000000000000000000000
- [261] DUP4
- [262] MSTORE
- [263] AND
- [264] PUSH1 0x04
- [265] DUP3
- [266] ADD
- [267] MSTORE
- [268] REVERT
- [269] JUMPDEST
- [270] POP
- [271] DUP1
- [272] EXTCODESIZE
- [273] ISZERO
- [274] PUSH2 0x0267
- [275] JUMP
- [276] 'fe'(Unknown Opcode)
- [277] LOG2
- [278] PUSH5 0x6970667358
- [279] '22'(Unknown Opcode)
- [280] SLT
- [281] SHA3
- [282] PUSH16 0x9bfbeedc084a9dda94fc279ba559b670
- [283] 'ae'(Unknown Opcode)
- [284] SGT
- [285] '4c'(Unknown Opcode)
- [286] BLOBHASH
- [287] SWAP12
- [288] '2e'(Unknown Opcode)
- [289] '25'(Unknown Opcode)
- [290] 'dc'(Unknown Opcode)
- [291] 'd1'(Unknown Opcode)
- [292] '23'(Unknown Opcode)
- [293] CALLDATACOPY
- [294] GASPRICE
- [295] 'e0'(Unknown Opcode)
- [296] '23'(Unknown Opcode)
- [297] 'b9'(Unknown Opcode)
- [298] PUSH5 0x736f6c6343
- [299] STOP
- [300] ADDMOD
- [301] OR
- [302] STOP
- [303] CALLER