Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLVALUE
- [4] DUP1
- [5] ISZERO
- [6] PUSH2 0x000f
- [7] JUMPI
- [8] PUSH0 0x
- [9] PUSH0 0x
- [10] REVERT
- [11] JUMPDEST
- [12] POP
- [13] PUSH1 0x04
- [14] CALLDATASIZE
- [15] LT
- [16] PUSH2 0x0034
- [17] JUMPI
- [18] PUSH0 0x
- [19] CALLDATALOAD
- [20] PUSH1 0xe0
- [21] SHR
- [22] DUP1
- [23] PUSH4 0x893d20e8
- [24] EQ
- [25] PUSH2 0x0038
- [26] JUMPI
- [27] DUP1
- [28] PUSH4 0xa6f9dae1
- [29] EQ
- [30] PUSH2 0x0056
- [31] JUMPI
- [32] JUMPDEST
- [33] PUSH0 0x
- [34] PUSH0 0x
- [35] REVERT
- [36] JUMPDEST
- [37] PUSH2 0x0040
- [38] PUSH2 0x0072
- [39] JUMP
- [40] JUMPDEST
- [41] PUSH1 0x40
- [42] MLOAD
- [43] PUSH2 0x004d
- [44] SWAP2
- [45] SWAP1
- [46] PUSH2 0x024b
- [47] JUMP
- [48] JUMPDEST
- [49] PUSH1 0x40
- [50] MLOAD
- [51] DUP1
- [52] SWAP2
- [53] SUB
- [54] SWAP1
- [55] RETURN
- [56] JUMPDEST
- [57] PUSH2 0x0070
- [58] PUSH1 0x04
- [59] DUP1
- [60] CALLDATASIZE
- [61] SUB
- [62] DUP2
- [63] ADD
- [64] SWAP1
- [65] PUSH2 0x006b
- [66] SWAP2
- [67] SWAP1
- [68] PUSH2 0x0292
- [69] JUMP
- [70] JUMPDEST
- [71] PUSH2 0x0099
- [72] JUMP
- [73] JUMPDEST
- [74] STOP
- [75] JUMPDEST
- [76] PUSH0 0x
- [77] PUSH0 0x
- [78] PUSH0 0x
- [79] SWAP1
- [80] SLOAD
- [81] SWAP1
- [82] PUSH2 0x0100
- [83] EXP
- [84] SWAP1
- [85] DIV
- [86] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [87] AND
- [88] SWAP1
- [89] POP
- [90] SWAP1
- [91] JUMP
- [92] JUMPDEST
- [93] PUSH0 0x
- [94] PUSH0 0x
- [95] SWAP1
- [96] SLOAD
- [97] SWAP1
- [98] PUSH2 0x0100
- [99] EXP
- [100] SWAP1
- [101] DIV
- [102] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [103] AND
- [104] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [105] AND
- [106] CALLER
- [107] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [108] AND
- [109] EQ
- [110] PUSH2 0x0127
- [111] JUMPI
- [112] PUSH1 0x40
- [113] MLOAD
- [114] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
- [115] DUP2
- [116] MSTORE
- [117] PUSH1 0x04
- [118] ADD
- [119] PUSH2 0x011e
- [120] SWAP1
- [121] PUSH2 0x0317
- [122] JUMP
- [123] JUMPDEST
- [124] PUSH1 0x40
- [125] MLOAD
- [126] DUP1
- [127] SWAP2
- [128] SUB
- [129] SWAP1
- [130] REVERT
- [131] JUMPDEST
- [132] DUP1
- [133] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [134] AND
- [135] PUSH0 0x
- [136] PUSH0 0x
- [137] SWAP1
- [138] SLOAD
- [139] SWAP1
- [140] PUSH2 0x0100
- [141] EXP
- [142] SWAP1
- [143] DIV
- [144] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [145] AND
- [146] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [147] AND
- [148] PUSH32 0x342827c97908e5e2f71151c08502a66d44b6f758e3ac2f1de95f02eb95f0a735
- [149] PUSH1 0x40
- [150] MLOAD
- [151] PUSH1 0x40
- [152] MLOAD
- [153] DUP1
- [154] SWAP2
- [155] SUB
- [156] SWAP1
- [157] LOG3
- [158] DUP1
- [159] PUSH0 0x
- [160] PUSH0 0x
- [161] PUSH2 0x0100
- [162] EXP
- [163] DUP2
- [164] SLOAD
- [165] DUP2
- [166] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [167] MUL
- [168] NOT
- [169] AND
- [170] SWAP1
- [171] DUP4
- [172] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [173] AND
- [174] MUL
- [175] OR
- [176] SWAP1
- [177] SSTORE
- [178] POP
- [179] POP
- [180] JUMP
- [181] JUMPDEST
- [182] PUSH0 0x
- [183] PUSH11 0x636f6e736f6c652e6c6f67
- [184] SWAP1
- [185] POP
- [186] PUSH0 0x
- [187] PUSH0 0x
- [188] DUP4
- [189] MLOAD
- [190] PUSH1 0x20
- [191] DUP6
- [192] ADD
- [193] DUP5
- [194] GAS
- [195] STATICCALL
- [196] POP
- [197] POP
- [198] POP
- [199] JUMP
- [200] JUMPDEST
- [201] PUSH2 0x020a
- [202] PUSH2 0x0335
- [203] JUMP
- [204] JUMPDEST
- [205] JUMP
- [206] JUMPDEST
- [207] PUSH0 0x
- [208] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [209] DUP3
- [210] AND
- [211] SWAP1
- [212] POP
- [213] SWAP2
- [214] SWAP1
- [215] POP
- [216] JUMP
- [217] JUMPDEST
- [218] PUSH0 0x
- [219] PUSH2 0x0235
- [220] DUP3
- [221] PUSH2 0x020c
- [222] JUMP
- [223] JUMPDEST
- [224] SWAP1
- [225] POP
- [226] SWAP2
- [227] SWAP1
- [228] POP
- [229] JUMP
- [230] JUMPDEST
- [231] PUSH2 0x0245
- [232] DUP2
- [233] PUSH2 0x022b
- [234] JUMP
- [235] JUMPDEST
- [236] DUP3
- [237] MSTORE
- [238] POP
- [239] POP
- [240] JUMP
- [241] JUMPDEST
- [242] PUSH0 0x
- [243] PUSH1 0x20
- [244] DUP3
- [245] ADD
- [246] SWAP1
- [247] POP
- [248] PUSH2 0x025e
- [249] PUSH0 0x
- [250] DUP4
- [251] ADD
- [252] DUP5
- [253] PUSH2 0x023c
- [254] JUMP
- [255] JUMPDEST
- [256] SWAP3
- [257] SWAP2
- [258] POP
- [259] POP
- [260] JUMP
- [261] JUMPDEST
- [262] PUSH0 0x
- [263] PUSH0 0x
- [264] REVERT
- [265] JUMPDEST
- [266] PUSH2 0x0271
- [267] DUP2
- [268] PUSH2 0x022b
- [269] JUMP
- [270] JUMPDEST
- [271] DUP2
- [272] EQ
- [273] PUSH2 0x027b
- [274] JUMPI
- [275] PUSH0 0x
- [276] PUSH0 0x
- [277] REVERT
- [278] JUMPDEST
- [279] POP
- [280] JUMP
- [281] JUMPDEST
- [282] PUSH0 0x
- [283] DUP2
- [284] CALLDATALOAD
- [285] SWAP1
- [286] POP
- [287] PUSH2 0x028c
- [288] DUP2
- [289] PUSH2 0x0268
- [290] JUMP
- [291] JUMPDEST
- [292] SWAP3
- [293] SWAP2
- [294] POP
- [295] POP
- [296] JUMP
- [297] JUMPDEST
- [298] PUSH0 0x
- [299] PUSH1 0x20
- [300] DUP3
- [301] DUP5
- [302] SUB
- [303] SLT
- [304] ISZERO
- [305] PUSH2 0x02a7
- [306] JUMPI
- [307] PUSH2 0x02a6
- [308] PUSH2 0x0264
- [309] JUMP
- [310] JUMPDEST
- [311] JUMPDEST
- [312] PUSH0 0x
- [313] PUSH2 0x02b4
- [314] DUP5
- [315] DUP3
- [316] DUP6
- [317] ADD
- [318] PUSH2 0x027e
- [319] JUMP
- [320] JUMPDEST
- [321] SWAP2
- [322] POP
- [323] POP
- [324] SWAP3
- [325] SWAP2
- [326] POP
- [327] POP
- [328] JUMP
- [329] JUMPDEST
- [330] PUSH0 0x
- [331] DUP3
- [332] DUP3
- [333] MSTORE
- [334] PUSH1 0x20
- [335] DUP3
- [336] ADD
- [337] SWAP1
- [338] POP
- [339] SWAP3
- [340] SWAP2
- [341] POP
- [342] POP
- [343] JUMP
- [344] JUMPDEST
- [345] PUSH32 0x43616c6c6572206973206e6f74206f776e657200000000000000000000000000
- [346] PUSH0 0x
- [347] DUP3
- [348] ADD
- [349] MSTORE
- [350] POP
- [351] JUMP
- [352] JUMPDEST
- [353] PUSH0 0x
- [354] PUSH2 0x0301
- [355] PUSH1 0x13
- [356] DUP4
- [357] PUSH2 0x02bd
- [358] JUMP
- [359] JUMPDEST
- [360] SWAP2
- [361] POP
- [362] PUSH2 0x030c
- [363] DUP3
- [364] PUSH2 0x02cd
- [365] JUMP
- [366] JUMPDEST
- [367] PUSH1 0x20
- [368] DUP3
- [369] ADD
- [370] SWAP1
- [371] POP
- [372] SWAP2
- [373] SWAP1
- [374] POP
- [375] JUMP
- [376] JUMPDEST
- [377] PUSH0 0x
- [378] PUSH1 0x20
- [379] DUP3
- [380] ADD
- [381] SWAP1
- [382] POP
- [383] DUP2
- [384] DUP2
- [385] SUB
- [386] PUSH0 0x
- [387] DUP4
- [388] ADD
- [389] MSTORE
- [390] PUSH2 0x032e
- [391] DUP2
- [392] PUSH2 0x02f5
- [393] JUMP
- [394] JUMPDEST
- [395] SWAP1
- [396] POP
- [397] SWAP2
- [398] SWAP1
- [399] POP
- [400] JUMP
- [401] JUMPDEST
- [402] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
- [403] PUSH0 0x
- [404] MSTORE
- [405] PUSH1 0x51
- [406] PUSH1 0x04
- [407] MSTORE
- [408] PUSH1 0x24
- [409] PUSH0 0x
- [410] REVERT
- [411] 'fe'(Unknown Opcode)
- [412] LOG2
- [413] PUSH5 0x6970667358
- [414] '22'(Unknown Opcode)
- [415] SLT
- [416] SHA3
- [417] EXTCODEHASH
- [418] 'c5'(Unknown Opcode)
- [419] DUP6
- [420] LOG4
- [421] NOT
- [422] 'aa'(Unknown Opcode)
- [423] EXTCODECOPY
- [424] SWAP7
- [425] '4f'(Unknown Opcode)
- [426] 'a9'(Unknown Opcode)
- [427] 'c1'(Unknown Opcode)
- [428] '1e'(Unknown Opcode)
- [429] SAR
- [430] BLOCKHASH
- [431] '1e'(Unknown Opcode)
- [432] POP
- [433] LOG4
- [434] ADDMOD