Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLVALUE
- [4] DUP1
- [5] ISZERO
- [6] PUSH2 0x000f
- [7] JUMPI
- [8] PUSH0 0x
- [9] DUP1
- [10] REVERT
- [11] JUMPDEST
- [12] POP
- [13] PUSH1 0x04
- [14] CALLDATASIZE
- [15] LT
- [16] PUSH2 0x0034
- [17] JUMPI
- [18] PUSH0 0x
- [19] CALLDATALOAD
- [20] PUSH1 0xe0
- [21] SHR
- [22] DUP1
- [23] PUSH4 0x893d20e8
- [24] EQ
- [25] PUSH2 0x0038
- [26] JUMPI
- [27] DUP1
- [28] PUSH4 0xa6f9dae1
- [29] EQ
- [30] PUSH2 0x0056
- [31] JUMPI
- [32] JUMPDEST
- [33] PUSH0 0x
- [34] DUP1
- [35] REVERT
- [36] JUMPDEST
- [37] PUSH2 0x0040
- [38] PUSH2 0x0072
- [39] JUMP
- [40] JUMPDEST
- [41] PUSH1 0x40
- [42] MLOAD
- [43] PUSH2 0x004d
- [44] SWAP2
- [45] SWAP1
- [46] PUSH2 0x0249
- [47] JUMP
- [48] JUMPDEST
- [49] PUSH1 0x40
- [50] MLOAD
- [51] DUP1
- [52] SWAP2
- [53] SUB
- [54] SWAP1
- [55] RETURN
- [56] JUMPDEST
- [57] PUSH2 0x0070
- [58] PUSH1 0x04
- [59] DUP1
- [60] CALLDATASIZE
- [61] SUB
- [62] DUP2
- [63] ADD
- [64] SWAP1
- [65] PUSH2 0x006b
- [66] SWAP2
- [67] SWAP1
- [68] PUSH2 0x0290
- [69] JUMP
- [70] JUMPDEST
- [71] PUSH2 0x0099
- [72] JUMP
- [73] JUMPDEST
- [74] STOP
- [75] JUMPDEST
- [76] PUSH0 0x
- [77] DUP1
- [78] PUSH0 0x
- [79] SWAP1
- [80] SLOAD
- [81] SWAP1
- [82] PUSH2 0x0100
- [83] EXP
- [84] SWAP1
- [85] DIV
- [86] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [87] AND
- [88] SWAP1
- [89] POP
- [90] SWAP1
- [91] JUMP
- [92] JUMPDEST
- [93] PUSH0 0x
- [94] DUP1
- [95] SLOAD
- [96] SWAP1
- [97] PUSH2 0x0100
- [98] EXP
- [99] SWAP1
- [100] DIV
- [101] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [102] AND
- [103] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [104] AND
- [105] CALLER
- [106] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [107] AND
- [108] EQ
- [109] PUSH2 0x0126
- [110] JUMPI
- [111] PUSH1 0x40
- [112] MLOAD
- [113] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
- [114] DUP2
- [115] MSTORE
- [116] PUSH1 0x04
- [117] ADD
- [118] PUSH2 0x011d
- [119] SWAP1
- [120] PUSH2 0x0315
- [121] JUMP
- [122] JUMPDEST
- [123] PUSH1 0x40
- [124] MLOAD
- [125] DUP1
- [126] SWAP2
- [127] SUB
- [128] SWAP1
- [129] REVERT
- [130] JUMPDEST
- [131] DUP1
- [132] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [133] AND
- [134] PUSH0 0x
- [135] DUP1
- [136] SLOAD
- [137] SWAP1
- [138] PUSH2 0x0100
- [139] EXP
- [140] SWAP1
- [141] DIV
- [142] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [143] AND
- [144] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [145] AND
- [146] PUSH32 0x342827c97908e5e2f71151c08502a66d44b6f758e3ac2f1de95f02eb95f0a735
- [147] PUSH1 0x40
- [148] MLOAD
- [149] PUSH1 0x40
- [150] MLOAD
- [151] DUP1
- [152] SWAP2
- [153] SUB
- [154] SWAP1
- [155] LOG3
- [156] DUP1
- [157] PUSH0 0x
- [158] DUP1
- [159] PUSH2 0x0100
- [160] EXP
- [161] DUP2
- [162] SLOAD
- [163] DUP2
- [164] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [165] MUL
- [166] NOT
- [167] AND
- [168] SWAP1
- [169] DUP4
- [170] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [171] AND
- [172] MUL
- [173] OR
- [174] SWAP1
- [175] SSTORE
- [176] POP
- [177] POP
- [178] JUMP
- [179] JUMPDEST
- [180] PUSH0 0x
- [181] PUSH11 0x636f6e736f6c652e6c6f67
- [182] SWAP1
- [183] POP
- [184] PUSH0 0x
- [185] DUP1
- [186] DUP4
- [187] MLOAD
- [188] PUSH1 0x20
- [189] DUP6
- [190] ADD
- [191] DUP5
- [192] GAS
- [193] STATICCALL
- [194] POP
- [195] POP
- [196] POP
- [197] JUMP
- [198] JUMPDEST
- [199] PUSH2 0x0208
- [200] PUSH2 0x0333
- [201] JUMP
- [202] JUMPDEST
- [203] JUMP
- [204] JUMPDEST
- [205] PUSH0 0x
- [206] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [207] DUP3
- [208] AND
- [209] SWAP1
- [210] POP
- [211] SWAP2
- [212] SWAP1
- [213] POP
- [214] JUMP
- [215] JUMPDEST
- [216] PUSH0 0x
- [217] PUSH2 0x0233
- [218] DUP3
- [219] PUSH2 0x020a
- [220] JUMP
- [221] JUMPDEST
- [222] SWAP1
- [223] POP
- [224] SWAP2
- [225] SWAP1
- [226] POP
- [227] JUMP
- [228] JUMPDEST
- [229] PUSH2 0x0243
- [230] DUP2
- [231] PUSH2 0x0229
- [232] JUMP
- [233] JUMPDEST
- [234] DUP3
- [235] MSTORE
- [236] POP
- [237] POP
- [238] JUMP
- [239] JUMPDEST
- [240] PUSH0 0x
- [241] PUSH1 0x20
- [242] DUP3
- [243] ADD
- [244] SWAP1
- [245] POP
- [246] PUSH2 0x025c
- [247] PUSH0 0x
- [248] DUP4
- [249] ADD
- [250] DUP5
- [251] PUSH2 0x023a
- [252] JUMP
- [253] JUMPDEST
- [254] SWAP3
- [255] SWAP2
- [256] POP
- [257] POP
- [258] JUMP
- [259] JUMPDEST
- [260] PUSH0 0x
- [261] DUP1
- [262] REVERT
- [263] JUMPDEST
- [264] PUSH2 0x026f
- [265] DUP2
- [266] PUSH2 0x0229
- [267] JUMP
- [268] JUMPDEST
- [269] DUP2
- [270] EQ
- [271] PUSH2 0x0279
- [272] JUMPI
- [273] PUSH0 0x
- [274] DUP1
- [275] REVERT
- [276] JUMPDEST
- [277] POP
- [278] JUMP
- [279] JUMPDEST
- [280] PUSH0 0x
- [281] DUP2
- [282] CALLDATALOAD
- [283] SWAP1
- [284] POP
- [285] PUSH2 0x028a
- [286] DUP2
- [287] PUSH2 0x0266
- [288] JUMP
- [289] JUMPDEST
- [290] SWAP3
- [291] SWAP2
- [292] POP
- [293] POP
- [294] JUMP
- [295] JUMPDEST
- [296] PUSH0 0x
- [297] PUSH1 0x20
- [298] DUP3
- [299] DUP5
- [300] SUB
- [301] SLT
- [302] ISZERO
- [303] PUSH2 0x02a5
- [304] JUMPI
- [305] PUSH2 0x02a4
- [306] PUSH2 0x0262
- [307] JUMP
- [308] JUMPDEST
- [309] JUMPDEST
- [310] PUSH0 0x
- [311] PUSH2 0x02b2
- [312] DUP5
- [313] DUP3
- [314] DUP6
- [315] ADD
- [316] PUSH2 0x027c
- [317] JUMP
- [318] JUMPDEST
- [319] SWAP2
- [320] POP
- [321] POP
- [322] SWAP3
- [323] SWAP2
- [324] POP
- [325] POP
- [326] JUMP
- [327] JUMPDEST
- [328] PUSH0 0x
- [329] DUP3
- [330] DUP3
- [331] MSTORE
- [332] PUSH1 0x20
- [333] DUP3
- [334] ADD
- [335] SWAP1
- [336] POP
- [337] SWAP3
- [338] SWAP2
- [339] POP
- [340] POP
- [341] JUMP
- [342] JUMPDEST
- [343] PUSH32 0x43616c6c6572206973206e6f74206f776e657200000000000000000000000000
- [344] PUSH0 0x
- [345] DUP3
- [346] ADD
- [347] MSTORE
- [348] POP
- [349] JUMP
- [350] JUMPDEST
- [351] PUSH0 0x
- [352] PUSH2 0x02ff
- [353] PUSH1 0x13
- [354] DUP4
- [355] PUSH2 0x02bb
- [356] JUMP
- [357] JUMPDEST
- [358] SWAP2
- [359] POP
- [360] PUSH2 0x030a
- [361] DUP3
- [362] PUSH2 0x02cb
- [363] JUMP
- [364] JUMPDEST
- [365] PUSH1 0x20
- [366] DUP3
- [367] ADD
- [368] SWAP1
- [369] POP
- [370] SWAP2
- [371] SWAP1
- [372] POP
- [373] JUMP
- [374] JUMPDEST
- [375] PUSH0 0x
- [376] PUSH1 0x20
- [377] DUP3
- [378] ADD
- [379] SWAP1
- [380] POP
- [381] DUP2
- [382] DUP2
- [383] SUB
- [384] PUSH0 0x
- [385] DUP4
- [386] ADD
- [387] MSTORE
- [388] PUSH2 0x032c
- [389] DUP2
- [390] PUSH2 0x02f3
- [391] JUMP
- [392] JUMPDEST
- [393] SWAP1
- [394] POP
- [395] SWAP2
- [396] SWAP1
- [397] POP
- [398] JUMP
- [399] JUMPDEST
- [400] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
- [401] PUSH0 0x
- [402] MSTORE
- [403] PUSH1 0x51
- [404] PUSH1 0x04
- [405] MSTORE
- [406] PUSH1 0x24
- [407] PUSH0 0x
- [408] REVERT
- [409] 'fe'(Unknown Opcode)
- [410] LOG2
- [411] PUSH5 0x6970667358
- [412] '22'(Unknown Opcode)
- [413] SLT
- [414] SHA3
- [415] SHA3
- [416] DUP8
- [417] CREATE
- [418] TIMESTAMP
- [419] 'fb'(Unknown Opcode)
- [420] 'd1'(Unknown Opcode)
- [421] PUSH17 0xfdee1a5d4c301901125b210b8fe7f9c084
- [422] DUP6
- [423] LOG0
- [424] 'df'(Unknown Opcode)
- [425] SAR
- [426] 'ee'(Unknown Opcode)
- [427] BLOBBASEFEE
- [428] 'd0'(Unknown Opcode)
- [429] 'bd'(Unknown Opcode)
- [430] PUSH5 0x736f6c6343
- [431] STOP
- [432] ADDMOD
- [433] BYTE
- [434] STOP
- [435] CALLER