Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] PUSH0 0x
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0034
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x893d20e8
  • [24] EQ
  • [25] PUSH2 0x0038
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0xa6f9dae1
  • [29] EQ
  • [30] PUSH2 0x0056
  • [31] JUMPI
  • [32] JUMPDEST
  • [33] PUSH0 0x
  • [34] PUSH0 0x
  • [35] REVERT
  • [36] JUMPDEST
  • [37] PUSH2 0x0040
  • [38] PUSH2 0x0072
  • [39] JUMP
  • [40] JUMPDEST
  • [41] PUSH1 0x40
  • [42] MLOAD
  • [43] PUSH2 0x004d
  • [44] SWAP2
  • [45] SWAP1
  • [46] PUSH2 0x024b
  • [47] JUMP
  • [48] JUMPDEST
  • [49] PUSH1 0x40
  • [50] MLOAD
  • [51] DUP1
  • [52] SWAP2
  • [53] SUB
  • [54] SWAP1
  • [55] RETURN
  • [56] JUMPDEST
  • [57] PUSH2 0x0070
  • [58] PUSH1 0x04
  • [59] DUP1
  • [60] CALLDATASIZE
  • [61] SUB
  • [62] DUP2
  • [63] ADD
  • [64] SWAP1
  • [65] PUSH2 0x006b
  • [66] SWAP2
  • [67] SWAP1
  • [68] PUSH2 0x0292
  • [69] JUMP
  • [70] JUMPDEST
  • [71] PUSH2 0x0099
  • [72] JUMP
  • [73] JUMPDEST
  • [74] STOP
  • [75] JUMPDEST
  • [76] PUSH0 0x
  • [77] PUSH0 0x
  • [78] PUSH0 0x
  • [79] SWAP1
  • [80] SLOAD
  • [81] SWAP1
  • [82] PUSH2 0x0100
  • [83] EXP
  • [84] SWAP1
  • [85] DIV
  • [86] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [87] AND
  • [88] SWAP1
  • [89] POP
  • [90] SWAP1
  • [91] JUMP
  • [92] JUMPDEST
  • [93] PUSH0 0x
  • [94] PUSH0 0x
  • [95] SWAP1
  • [96] SLOAD
  • [97] SWAP1
  • [98] PUSH2 0x0100
  • [99] EXP
  • [100] SWAP1
  • [101] DIV
  • [102] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [103] AND
  • [104] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [105] AND
  • [106] CALLER
  • [107] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [108] AND
  • [109] EQ
  • [110] PUSH2 0x0127
  • [111] JUMPI
  • [112] PUSH1 0x40
  • [113] MLOAD
  • [114] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
  • [115] DUP2
  • [116] MSTORE
  • [117] PUSH1 0x04
  • [118] ADD
  • [119] PUSH2 0x011e
  • [120] SWAP1
  • [121] PUSH2 0x0317
  • [122] JUMP
  • [123] JUMPDEST
  • [124] PUSH1 0x40
  • [125] MLOAD
  • [126] DUP1
  • [127] SWAP2
  • [128] SUB
  • [129] SWAP1
  • [130] REVERT
  • [131] JUMPDEST
  • [132] DUP1
  • [133] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [134] AND
  • [135] PUSH0 0x
  • [136] PUSH0 0x
  • [137] SWAP1
  • [138] SLOAD
  • [139] SWAP1
  • [140] PUSH2 0x0100
  • [141] EXP
  • [142] SWAP1
  • [143] DIV
  • [144] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [145] AND
  • [146] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [147] AND
  • [148] PUSH32 0x342827c97908e5e2f71151c08502a66d44b6f758e3ac2f1de95f02eb95f0a735
  • [149] PUSH1 0x40
  • [150] MLOAD
  • [151] PUSH1 0x40
  • [152] MLOAD
  • [153] DUP1
  • [154] SWAP2
  • [155] SUB
  • [156] SWAP1
  • [157] LOG3
  • [158] DUP1
  • [159] PUSH0 0x
  • [160] PUSH0 0x
  • [161] PUSH2 0x0100
  • [162] EXP
  • [163] DUP2
  • [164] SLOAD
  • [165] DUP2
  • [166] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [167] MUL
  • [168] NOT
  • [169] AND
  • [170] SWAP1
  • [171] DUP4
  • [172] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [173] AND
  • [174] MUL
  • [175] OR
  • [176] SWAP1
  • [177] SSTORE
  • [178] POP
  • [179] POP
  • [180] JUMP
  • [181] JUMPDEST
  • [182] PUSH0 0x
  • [183] PUSH11 0x636f6e736f6c652e6c6f67
  • [184] SWAP1
  • [185] POP
  • [186] PUSH0 0x
  • [187] PUSH0 0x
  • [188] DUP4
  • [189] MLOAD
  • [190] PUSH1 0x20
  • [191] DUP6
  • [192] ADD
  • [193] DUP5
  • [194] GAS
  • [195] STATICCALL
  • [196] POP
  • [197] POP
  • [198] POP
  • [199] JUMP
  • [200] JUMPDEST
  • [201] PUSH2 0x020a
  • [202] PUSH2 0x0335
  • [203] JUMP
  • [204] JUMPDEST
  • [205] JUMP
  • [206] JUMPDEST
  • [207] PUSH0 0x
  • [208] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [209] DUP3
  • [210] AND
  • [211] SWAP1
  • [212] POP
  • [213] SWAP2
  • [214] SWAP1
  • [215] POP
  • [216] JUMP
  • [217] JUMPDEST
  • [218] PUSH0 0x
  • [219] PUSH2 0x0235
  • [220] DUP3
  • [221] PUSH2 0x020c
  • [222] JUMP
  • [223] JUMPDEST
  • [224] SWAP1
  • [225] POP
  • [226] SWAP2
  • [227] SWAP1
  • [228] POP
  • [229] JUMP
  • [230] JUMPDEST
  • [231] PUSH2 0x0245
  • [232] DUP2
  • [233] PUSH2 0x022b
  • [234] JUMP
  • [235] JUMPDEST
  • [236] DUP3
  • [237] MSTORE
  • [238] POP
  • [239] POP
  • [240] JUMP
  • [241] JUMPDEST
  • [242] PUSH0 0x
  • [243] PUSH1 0x20
  • [244] DUP3
  • [245] ADD
  • [246] SWAP1
  • [247] POP
  • [248] PUSH2 0x025e
  • [249] PUSH0 0x
  • [250] DUP4
  • [251] ADD
  • [252] DUP5
  • [253] PUSH2 0x023c
  • [254] JUMP
  • [255] JUMPDEST
  • [256] SWAP3
  • [257] SWAP2
  • [258] POP
  • [259] POP
  • [260] JUMP
  • [261] JUMPDEST
  • [262] PUSH0 0x
  • [263] PUSH0 0x
  • [264] REVERT
  • [265] JUMPDEST
  • [266] PUSH2 0x0271
  • [267] DUP2
  • [268] PUSH2 0x022b
  • [269] JUMP
  • [270] JUMPDEST
  • [271] DUP2
  • [272] EQ
  • [273] PUSH2 0x027b
  • [274] JUMPI
  • [275] PUSH0 0x
  • [276] PUSH0 0x
  • [277] REVERT
  • [278] JUMPDEST
  • [279] POP
  • [280] JUMP
  • [281] JUMPDEST
  • [282] PUSH0 0x
  • [283] DUP2
  • [284] CALLDATALOAD
  • [285] SWAP1
  • [286] POP
  • [287] PUSH2 0x028c
  • [288] DUP2
  • [289] PUSH2 0x0268
  • [290] JUMP
  • [291] JUMPDEST
  • [292] SWAP3
  • [293] SWAP2
  • [294] POP
  • [295] POP
  • [296] JUMP
  • [297] JUMPDEST
  • [298] PUSH0 0x
  • [299] PUSH1 0x20
  • [300] DUP3
  • [301] DUP5
  • [302] SUB
  • [303] SLT
  • [304] ISZERO
  • [305] PUSH2 0x02a7
  • [306] JUMPI
  • [307] PUSH2 0x02a6
  • [308] PUSH2 0x0264
  • [309] JUMP
  • [310] JUMPDEST
  • [311] JUMPDEST
  • [312] PUSH0 0x
  • [313] PUSH2 0x02b4
  • [314] DUP5
  • [315] DUP3
  • [316] DUP6
  • [317] ADD
  • [318] PUSH2 0x027e
  • [319] JUMP
  • [320] JUMPDEST
  • [321] SWAP2
  • [322] POP
  • [323] POP
  • [324] SWAP3
  • [325] SWAP2
  • [326] POP
  • [327] POP
  • [328] JUMP
  • [329] JUMPDEST
  • [330] PUSH0 0x
  • [331] DUP3
  • [332] DUP3
  • [333] MSTORE
  • [334] PUSH1 0x20
  • [335] DUP3
  • [336] ADD
  • [337] SWAP1
  • [338] POP
  • [339] SWAP3
  • [340] SWAP2
  • [341] POP
  • [342] POP
  • [343] JUMP
  • [344] JUMPDEST
  • [345] PUSH32 0x43616c6c6572206973206e6f74206f776e657200000000000000000000000000
  • [346] PUSH0 0x
  • [347] DUP3
  • [348] ADD
  • [349] MSTORE
  • [350] POP
  • [351] JUMP
  • [352] JUMPDEST
  • [353] PUSH0 0x
  • [354] PUSH2 0x0301
  • [355] PUSH1 0x13
  • [356] DUP4
  • [357] PUSH2 0x02bd
  • [358] JUMP
  • [359] JUMPDEST
  • [360] SWAP2
  • [361] POP
  • [362] PUSH2 0x030c
  • [363] DUP3
  • [364] PUSH2 0x02cd
  • [365] JUMP
  • [366] JUMPDEST
  • [367] PUSH1 0x20
  • [368] DUP3
  • [369] ADD
  • [370] SWAP1
  • [371] POP
  • [372] SWAP2
  • [373] SWAP1
  • [374] POP
  • [375] JUMP
  • [376] JUMPDEST
  • [377] PUSH0 0x
  • [378] PUSH1 0x20
  • [379] DUP3
  • [380] ADD
  • [381] SWAP1
  • [382] POP
  • [383] DUP2
  • [384] DUP2
  • [385] SUB
  • [386] PUSH0 0x
  • [387] DUP4
  • [388] ADD
  • [389] MSTORE
  • [390] PUSH2 0x032e
  • [391] DUP2
  • [392] PUSH2 0x02f5
  • [393] JUMP
  • [394] JUMPDEST
  • [395] SWAP1
  • [396] POP
  • [397] SWAP2
  • [398] SWAP1
  • [399] POP
  • [400] JUMP
  • [401] JUMPDEST
  • [402] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
  • [403] PUSH0 0x
  • [404] MSTORE
  • [405] PUSH1 0x51
  • [406] PUSH1 0x04
  • [407] MSTORE
  • [408] PUSH1 0x24
  • [409] PUSH0 0x
  • [410] REVERT
  • [411] 'fe'(Unknown Opcode)
  • [412] LOG2
  • [413] PUSH5 0x6970667358
  • [414] '22'(Unknown Opcode)
  • [415] SLT
  • [416] SHA3
  • [417] EXTCODEHASH
  • [418] 'c5'(Unknown Opcode)
  • [419] DUP6
  • [420] LOG4
  • [421] NOT
  • [422] 'aa'(Unknown Opcode)
  • [423] EXTCODECOPY
  • [424] SWAP7
  • [425] '4f'(Unknown Opcode)
  • [426] 'a9'(Unknown Opcode)
  • [427] 'c1'(Unknown Opcode)
  • [428] '1e'(Unknown Opcode)
  • [429] SAR
  • [430] BLOCKHASH
  • [431] '1e'(Unknown Opcode)
  • [432] POP
  • [433] LOG4
  • [434] ADDMOD