Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0034
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x893d20e8
  • [24] EQ
  • [25] PUSH2 0x0038
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0xa6f9dae1
  • [29] EQ
  • [30] PUSH2 0x0056
  • [31] JUMPI
  • [32] JUMPDEST
  • [33] PUSH0 0x
  • [34] DUP1
  • [35] REVERT
  • [36] JUMPDEST
  • [37] PUSH2 0x0040
  • [38] PUSH2 0x0072
  • [39] JUMP
  • [40] JUMPDEST
  • [41] PUSH1 0x40
  • [42] MLOAD
  • [43] PUSH2 0x004d
  • [44] SWAP2
  • [45] SWAP1
  • [46] PUSH2 0x0249
  • [47] JUMP
  • [48] JUMPDEST
  • [49] PUSH1 0x40
  • [50] MLOAD
  • [51] DUP1
  • [52] SWAP2
  • [53] SUB
  • [54] SWAP1
  • [55] RETURN
  • [56] JUMPDEST
  • [57] PUSH2 0x0070
  • [58] PUSH1 0x04
  • [59] DUP1
  • [60] CALLDATASIZE
  • [61] SUB
  • [62] DUP2
  • [63] ADD
  • [64] SWAP1
  • [65] PUSH2 0x006b
  • [66] SWAP2
  • [67] SWAP1
  • [68] PUSH2 0x0290
  • [69] JUMP
  • [70] JUMPDEST
  • [71] PUSH2 0x0099
  • [72] JUMP
  • [73] JUMPDEST
  • [74] STOP
  • [75] JUMPDEST
  • [76] PUSH0 0x
  • [77] DUP1
  • [78] PUSH0 0x
  • [79] SWAP1
  • [80] SLOAD
  • [81] SWAP1
  • [82] PUSH2 0x0100
  • [83] EXP
  • [84] SWAP1
  • [85] DIV
  • [86] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [87] AND
  • [88] SWAP1
  • [89] POP
  • [90] SWAP1
  • [91] JUMP
  • [92] JUMPDEST
  • [93] PUSH0 0x
  • [94] DUP1
  • [95] SLOAD
  • [96] SWAP1
  • [97] PUSH2 0x0100
  • [98] EXP
  • [99] SWAP1
  • [100] DIV
  • [101] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [102] AND
  • [103] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [104] AND
  • [105] CALLER
  • [106] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [107] AND
  • [108] EQ
  • [109] PUSH2 0x0126
  • [110] JUMPI
  • [111] PUSH1 0x40
  • [112] MLOAD
  • [113] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
  • [114] DUP2
  • [115] MSTORE
  • [116] PUSH1 0x04
  • [117] ADD
  • [118] PUSH2 0x011d
  • [119] SWAP1
  • [120] PUSH2 0x0315
  • [121] JUMP
  • [122] JUMPDEST
  • [123] PUSH1 0x40
  • [124] MLOAD
  • [125] DUP1
  • [126] SWAP2
  • [127] SUB
  • [128] SWAP1
  • [129] REVERT
  • [130] JUMPDEST
  • [131] DUP1
  • [132] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [133] AND
  • [134] PUSH0 0x
  • [135] DUP1
  • [136] SLOAD
  • [137] SWAP1
  • [138] PUSH2 0x0100
  • [139] EXP
  • [140] SWAP1
  • [141] DIV
  • [142] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [143] AND
  • [144] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [145] AND
  • [146] PUSH32 0x342827c97908e5e2f71151c08502a66d44b6f758e3ac2f1de95f02eb95f0a735
  • [147] PUSH1 0x40
  • [148] MLOAD
  • [149] PUSH1 0x40
  • [150] MLOAD
  • [151] DUP1
  • [152] SWAP2
  • [153] SUB
  • [154] SWAP1
  • [155] LOG3
  • [156] DUP1
  • [157] PUSH0 0x
  • [158] DUP1
  • [159] PUSH2 0x0100
  • [160] EXP
  • [161] DUP2
  • [162] SLOAD
  • [163] DUP2
  • [164] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [165] MUL
  • [166] NOT
  • [167] AND
  • [168] SWAP1
  • [169] DUP4
  • [170] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [171] AND
  • [172] MUL
  • [173] OR
  • [174] SWAP1
  • [175] SSTORE
  • [176] POP
  • [177] POP
  • [178] JUMP
  • [179] JUMPDEST
  • [180] PUSH0 0x
  • [181] PUSH11 0x636f6e736f6c652e6c6f67
  • [182] SWAP1
  • [183] POP
  • [184] PUSH0 0x
  • [185] DUP1
  • [186] DUP4
  • [187] MLOAD
  • [188] PUSH1 0x20
  • [189] DUP6
  • [190] ADD
  • [191] DUP5
  • [192] GAS
  • [193] STATICCALL
  • [194] POP
  • [195] POP
  • [196] POP
  • [197] JUMP
  • [198] JUMPDEST
  • [199] PUSH2 0x0208
  • [200] PUSH2 0x0333
  • [201] JUMP
  • [202] JUMPDEST
  • [203] JUMP
  • [204] JUMPDEST
  • [205] PUSH0 0x
  • [206] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [207] DUP3
  • [208] AND
  • [209] SWAP1
  • [210] POP
  • [211] SWAP2
  • [212] SWAP1
  • [213] POP
  • [214] JUMP
  • [215] JUMPDEST
  • [216] PUSH0 0x
  • [217] PUSH2 0x0233
  • [218] DUP3
  • [219] PUSH2 0x020a
  • [220] JUMP
  • [221] JUMPDEST
  • [222] SWAP1
  • [223] POP
  • [224] SWAP2
  • [225] SWAP1
  • [226] POP
  • [227] JUMP
  • [228] JUMPDEST
  • [229] PUSH2 0x0243
  • [230] DUP2
  • [231] PUSH2 0x0229
  • [232] JUMP
  • [233] JUMPDEST
  • [234] DUP3
  • [235] MSTORE
  • [236] POP
  • [237] POP
  • [238] JUMP
  • [239] JUMPDEST
  • [240] PUSH0 0x
  • [241] PUSH1 0x20
  • [242] DUP3
  • [243] ADD
  • [244] SWAP1
  • [245] POP
  • [246] PUSH2 0x025c
  • [247] PUSH0 0x
  • [248] DUP4
  • [249] ADD
  • [250] DUP5
  • [251] PUSH2 0x023a
  • [252] JUMP
  • [253] JUMPDEST
  • [254] SWAP3
  • [255] SWAP2
  • [256] POP
  • [257] POP
  • [258] JUMP
  • [259] JUMPDEST
  • [260] PUSH0 0x
  • [261] DUP1
  • [262] REVERT
  • [263] JUMPDEST
  • [264] PUSH2 0x026f
  • [265] DUP2
  • [266] PUSH2 0x0229
  • [267] JUMP
  • [268] JUMPDEST
  • [269] DUP2
  • [270] EQ
  • [271] PUSH2 0x0279
  • [272] JUMPI
  • [273] PUSH0 0x
  • [274] DUP1
  • [275] REVERT
  • [276] JUMPDEST
  • [277] POP
  • [278] JUMP
  • [279] JUMPDEST
  • [280] PUSH0 0x
  • [281] DUP2
  • [282] CALLDATALOAD
  • [283] SWAP1
  • [284] POP
  • [285] PUSH2 0x028a
  • [286] DUP2
  • [287] PUSH2 0x0266
  • [288] JUMP
  • [289] JUMPDEST
  • [290] SWAP3
  • [291] SWAP2
  • [292] POP
  • [293] POP
  • [294] JUMP
  • [295] JUMPDEST
  • [296] PUSH0 0x
  • [297] PUSH1 0x20
  • [298] DUP3
  • [299] DUP5
  • [300] SUB
  • [301] SLT
  • [302] ISZERO
  • [303] PUSH2 0x02a5
  • [304] JUMPI
  • [305] PUSH2 0x02a4
  • [306] PUSH2 0x0262
  • [307] JUMP
  • [308] JUMPDEST
  • [309] JUMPDEST
  • [310] PUSH0 0x
  • [311] PUSH2 0x02b2
  • [312] DUP5
  • [313] DUP3
  • [314] DUP6
  • [315] ADD
  • [316] PUSH2 0x027c
  • [317] JUMP
  • [318] JUMPDEST
  • [319] SWAP2
  • [320] POP
  • [321] POP
  • [322] SWAP3
  • [323] SWAP2
  • [324] POP
  • [325] POP
  • [326] JUMP
  • [327] JUMPDEST
  • [328] PUSH0 0x
  • [329] DUP3
  • [330] DUP3
  • [331] MSTORE
  • [332] PUSH1 0x20
  • [333] DUP3
  • [334] ADD
  • [335] SWAP1
  • [336] POP
  • [337] SWAP3
  • [338] SWAP2
  • [339] POP
  • [340] POP
  • [341] JUMP
  • [342] JUMPDEST
  • [343] PUSH32 0x43616c6c6572206973206e6f74206f776e657200000000000000000000000000
  • [344] PUSH0 0x
  • [345] DUP3
  • [346] ADD
  • [347] MSTORE
  • [348] POP
  • [349] JUMP
  • [350] JUMPDEST
  • [351] PUSH0 0x
  • [352] PUSH2 0x02ff
  • [353] PUSH1 0x13
  • [354] DUP4
  • [355] PUSH2 0x02bb
  • [356] JUMP
  • [357] JUMPDEST
  • [358] SWAP2
  • [359] POP
  • [360] PUSH2 0x030a
  • [361] DUP3
  • [362] PUSH2 0x02cb
  • [363] JUMP
  • [364] JUMPDEST
  • [365] PUSH1 0x20
  • [366] DUP3
  • [367] ADD
  • [368] SWAP1
  • [369] POP
  • [370] SWAP2
  • [371] SWAP1
  • [372] POP
  • [373] JUMP
  • [374] JUMPDEST
  • [375] PUSH0 0x
  • [376] PUSH1 0x20
  • [377] DUP3
  • [378] ADD
  • [379] SWAP1
  • [380] POP
  • [381] DUP2
  • [382] DUP2
  • [383] SUB
  • [384] PUSH0 0x
  • [385] DUP4
  • [386] ADD
  • [387] MSTORE
  • [388] PUSH2 0x032c
  • [389] DUP2
  • [390] PUSH2 0x02f3
  • [391] JUMP
  • [392] JUMPDEST
  • [393] SWAP1
  • [394] POP
  • [395] SWAP2
  • [396] SWAP1
  • [397] POP
  • [398] JUMP
  • [399] JUMPDEST
  • [400] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
  • [401] PUSH0 0x
  • [402] MSTORE
  • [403] PUSH1 0x51
  • [404] PUSH1 0x04
  • [405] MSTORE
  • [406] PUSH1 0x24
  • [407] PUSH0 0x
  • [408] REVERT
  • [409] 'fe'(Unknown Opcode)
  • [410] LOG2
  • [411] PUSH5 0x6970667358
  • [412] '22'(Unknown Opcode)
  • [413] SLT
  • [414] SHA3
  • [415] SHA3
  • [416] DUP8
  • [417] CREATE
  • [418] TIMESTAMP
  • [419] 'fb'(Unknown Opcode)
  • [420] 'd1'(Unknown Opcode)
  • [421] PUSH17 0xfdee1a5d4c301901125b210b8fe7f9c084
  • [422] DUP6
  • [423] LOG0
  • [424] 'df'(Unknown Opcode)
  • [425] SAR
  • [426] 'ee'(Unknown Opcode)
  • [427] BLOBBASEFEE
  • [428] 'd0'(Unknown Opcode)
  • [429] 'bd'(Unknown Opcode)
  • [430] PUSH5 0x736f6c6343
  • [431] STOP
  • [432] ADDMOD
  • [433] BYTE
  • [434] STOP
  • [435] CALLER