APE Price: $1.16 (-2.00%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLDATASIZE
  • [4] PUSH2 0x0013
  • [5] JUMPI
  • [6] PUSH2 0x0011
  • [7] PUSH2 0x0017
  • [8] JUMP
  • [9] JUMPDEST
  • [10] STOP
  • [11] JUMPDEST
  • [12] PUSH2 0x0011
  • [13] JUMPDEST
  • [14] PUSH2 0x0027
  • [15] PUSH2 0x0022
  • [16] PUSH2 0x0029
  • [17] JUMP
  • [18] JUMPDEST
  • [19] PUSH2 0x00bf
  • [20] JUMP
  • [21] JUMPDEST
  • [22] JUMP
  • [23] JUMPDEST
  • [24] PUSH0 0x
  • [25] PUSH2 0x005b
  • [26] PUSH32 0xa3f0ad74e5423aebfd80d3ef4346578335a9a72aeaee59ff6cb3582b35133d50
  • [27] SLOAD
  • [28] PUSH1 0x01
  • [29] PUSH1 0x01
  • [30] PUSH1 0xa0
  • [31] SHL
  • [32] SUB
  • [33] AND
  • [34] SWAP1
  • [35] JUMP
  • [36] JUMPDEST
  • [37] PUSH1 0x01
  • [38] PUSH1 0x01
  • [39] PUSH1 0xa0
  • [40] SHL
  • [41] SUB
  • [42] AND
  • [43] PUSH4 0x5c60da1b
  • [44] PUSH1 0x40
  • [45] MLOAD
  • [46] DUP2
  • [47] PUSH4 0xffffffff
  • [48] AND
  • [49] PUSH1 0xe0
  • [50] SHL
  • [51] DUP2
  • [52] MSTORE
  • [53] PUSH1 0x04
  • [54] ADD
  • [55] PUSH1 0x20
  • [56] PUSH1 0x40
  • [57] MLOAD
  • [58] DUP1
  • [59] DUP4
  • [60] SUB
  • [61] DUP2
  • [62] DUP7
  • [63] GAS
  • [64] STATICCALL
  • [65] ISZERO
  • [66] DUP1
  • [67] ISZERO
  • [68] PUSH2 0x0096
  • [69] JUMPI
  • [70] RETURNDATASIZE
  • [71] PUSH0 0x
  • [72] DUP1
  • [73] RETURNDATACOPY
  • [74] RETURNDATASIZE
  • [75] PUSH0 0x
  • [76] REVERT
  • [77] JUMPDEST
  • [78] POP
  • [79] POP
  • [80] POP
  • [81] POP
  • [82] PUSH1 0x40
  • [83] MLOAD
  • [84] RETURNDATASIZE
  • [85] PUSH1 0x1f
  • [86] NOT
  • [87] PUSH1 0x1f
  • [88] DUP3
  • [89] ADD
  • [90] AND
  • [91] DUP3
  • [92] ADD
  • [93] DUP1
  • [94] PUSH1 0x40
  • [95] MSTORE
  • [96] POP
  • [97] DUP2
  • [98] ADD
  • [99] SWAP1
  • [100] PUSH2 0x00ba
  • [101] SWAP2
  • [102] SWAP1
  • [103] PUSH2 0x00dd
  • [104] JUMP
  • [105] JUMPDEST
  • [106] SWAP1
  • [107] POP
  • [108] SWAP1
  • [109] JUMP
  • [110] JUMPDEST
  • [111] CALLDATASIZE
  • [112] PUSH0 0x
  • [113] DUP1
  • [114] CALLDATACOPY
  • [115] PUSH0 0x
  • [116] DUP1
  • [117] CALLDATASIZE
  • [118] PUSH0 0x
  • [119] DUP5
  • [120] GAS
  • [121] DELEGATECALL
  • [122] RETURNDATASIZE
  • [123] PUSH0 0x
  • [124] DUP1
  • [125] RETURNDATACOPY
  • [126] DUP1
  • [127] DUP1
  • [128] ISZERO
  • [129] PUSH2 0x00d9
  • [130] JUMPI
  • [131] RETURNDATASIZE
  • [132] PUSH0 0x
  • [133] RETURN
  • [134] JUMPDEST
  • [135] RETURNDATASIZE
  • [136] PUSH0 0x
  • [137] REVERT
  • [138] JUMPDEST
  • [139] PUSH0 0x
  • [140] PUSH1 0x20
  • [141] DUP3
  • [142] DUP5
  • [143] SUB
  • [144] SLT
  • [145] ISZERO
  • [146] PUSH2 0x00ed
  • [147] JUMPI
  • [148] PUSH0 0x
  • [149] DUP1
  • [150] REVERT
  • [151] JUMPDEST
  • [152] DUP2
  • [153] MLOAD
  • [154] PUSH1 0x01
  • [155] PUSH1 0x01
  • [156] PUSH1 0xa0
  • [157] SHL
  • [158] SUB
  • [159] DUP2
  • [160] AND
  • [161] DUP2
  • [162] EQ
  • [163] PUSH2 0x0103
  • [164] JUMPI
  • [165] PUSH0 0x
  • [166] DUP1
  • [167] REVERT
  • [168] JUMPDEST
  • [169] SWAP4
  • [170] SWAP3
  • [171] POP
  • [172] POP
  • [173] POP
  • [174] JUMP
  • [175] 'fe'(Unknown Opcode)
  • [176] LOG2
  • [177] PUSH5 0x6970667358
  • [178] '22'(Unknown Opcode)
  • [179] SLT
  • [180] SHA3
  • [181] 'c3'(Unknown Opcode)
  • [182] EXP
  • [183] 'e0'(Unknown Opcode)
  • [184] 'de'(Unknown Opcode)
  • [185] '4f'(Unknown Opcode)
  • [186] SDIV
  • [187] 'da'(Unknown Opcode)
  • [188] 'ec'(Unknown Opcode)
  • [189] PUSH22 0x5a656c958bd9ec33b42cd64e48758c53ca8d9ff5e89f
  • [190] SWAP15
  • [191] PUSH5 0x736f6c6343
  • [192] STOP
  • [193] ADDMOD
  • [194] ISZERO
  • [195] STOP
  • [196] CALLER