Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x0010
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x002b
  • [17] JUMPI
  • [18] PUSH1 0x00
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x1249c58b
  • [24] EQ
  • [25] PUSH2 0x0030
  • [26] JUMPI
  • [27] JUMPDEST
  • [28] PUSH1 0x00
  • [29] DUP1
  • [30] REVERT
  • [31] JUMPDEST
  • [32] PUSH2 0x0038
  • [33] PUSH2 0x003a
  • [34] JUMP
  • [35] JUMPDEST
  • [36] STOP
  • [37] JUMPDEST
  • [38] CALLER
  • [39] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [40] AND
  • [41] PUSH32 0x665fba0baf3dc33e9943340197893ac16f56482c2defb8de60f944987fee451c
  • [42] PUSH1 0x40
  • [43] MLOAD
  • [44] DUP1
  • [45] PUSH1 0xa0
  • [46] ADD
  • [47] PUSH1 0x40
  • [48] MSTORE
  • [49] DUP1
  • [50] PUSH1 0x78
  • [51] DUP2
  • [52] MSTORE
  • [53] PUSH1 0x20
  • [54] ADD
  • [55] PUSH2 0x0155
  • [56] PUSH1 0x78
  • [57] SWAP2
  • [58] CODECOPY
  • [59] PUSH1 0x40
  • [60] MLOAD
  • [61] PUSH2 0x0098
  • [62] SWAP2
  • [63] SWAP1
  • [64] PUSH2 0x0132
  • [65] JUMP
  • [66] JUMPDEST
  • [67] PUSH1 0x40
  • [68] MLOAD
  • [69] DUP1
  • [70] SWAP2
  • [71] SUB
  • [72] SWAP1
  • [73] LOG2
  • [74] JUMP
  • [75] JUMPDEST
  • [76] PUSH1 0x00
  • [77] DUP2
  • [78] MLOAD
  • [79] SWAP1
  • [80] POP
  • [81] SWAP2
  • [82] SWAP1
  • [83] POP
  • [84] JUMP
  • [85] JUMPDEST
  • [86] PUSH1 0x00
  • [87] DUP3
  • [88] DUP3
  • [89] MSTORE
  • [90] PUSH1 0x20
  • [91] DUP3
  • [92] ADD
  • [93] SWAP1
  • [94] POP
  • [95] SWAP3
  • [96] SWAP2
  • [97] POP
  • [98] POP
  • [99] JUMP
  • [100] JUMPDEST
  • [101] PUSH1 0x00
  • [102] JUMPDEST
  • [103] DUP4
  • [104] DUP2
  • [105] LT
  • [106] ISZERO
  • [107] PUSH2 0x00dc
  • [108] JUMPI
  • [109] DUP1
  • [110] DUP3
  • [111] ADD
  • [112] MLOAD
  • [113] DUP2
  • [114] DUP5
  • [115] ADD
  • [116] MSTORE
  • [117] PUSH1 0x20
  • [118] DUP2
  • [119] ADD
  • [120] SWAP1
  • [121] POP
  • [122] PUSH2 0x00c1
  • [123] JUMP
  • [124] JUMPDEST
  • [125] PUSH1 0x00
  • [126] DUP5
  • [127] DUP5
  • [128] ADD
  • [129] MSTORE
  • [130] POP
  • [131] POP
  • [132] POP
  • [133] POP
  • [134] JUMP
  • [135] JUMPDEST
  • [136] PUSH1 0x00
  • [137] PUSH1 0x1f
  • [138] NOT
  • [139] PUSH1 0x1f
  • [140] DUP4
  • [141] ADD
  • [142] AND
  • [143] SWAP1
  • [144] POP
  • [145] SWAP2
  • [146] SWAP1
  • [147] POP
  • [148] JUMP
  • [149] JUMPDEST
  • [150] PUSH1 0x00
  • [151] PUSH2 0x0104
  • [152] DUP3
  • [153] PUSH2 0x00a2
  • [154] JUMP
  • [155] JUMPDEST
  • [156] PUSH2 0x010e
  • [157] DUP2
  • [158] DUP6
  • [159] PUSH2 0x00ad
  • [160] JUMP
  • [161] JUMPDEST
  • [162] SWAP4
  • [163] POP
  • [164] PUSH2 0x011e
  • [165] DUP2
  • [166] DUP6
  • [167] PUSH1 0x20
  • [168] DUP7
  • [169] ADD
  • [170] PUSH2 0x00be
  • [171] JUMP
  • [172] JUMPDEST
  • [173] PUSH2 0x0127
  • [174] DUP2
  • [175] PUSH2 0x00e8
  • [176] JUMP
  • [177] JUMPDEST
  • [178] DUP5
  • [179] ADD
  • [180] SWAP2
  • [181] POP
  • [182] POP
  • [183] SWAP3
  • [184] SWAP2
  • [185] POP
  • [186] POP
  • [187] JUMP
  • [188] JUMPDEST
  • [189] PUSH1 0x00
  • [190] PUSH1 0x20
  • [191] DUP3
  • [192] ADD
  • [193] SWAP1
  • [194] POP
  • [195] DUP2
  • [196] DUP2
  • [197] SUB
  • [198] PUSH1 0x00
  • [199] DUP4
  • [200] ADD
  • [201] MSTORE
  • [202] PUSH2 0x014c
  • [203] DUP2
  • [204] DUP5
  • [205] PUSH2 0x00f9
  • [206] JUMP
  • [207] JUMPDEST
  • [208] SWAP1
  • [209] POP
  • [210] SWAP3
  • [211] SWAP2
  • [212] POP
  • [213] POP
  • [214] JUMP
  • [215] 'fe'(Unknown Opcode)
  • [216] ADDRESS
  • [217] PUSH25 0x36343631373436313361326337623232373032323361323236
  • [218] CALLDATALOAD
  • [219] CALLDATACOPY
  • [220] ORIGIN
  • [221] CALLDATASIZE
  • [222] CALLER
  • [223] ORIGIN
  • [224] PUSH5 0x3332333032
  • [225] ORIGIN
  • [226] ORIGIN
  • [227] PUSH4 0x32323666
  • [228] CALLDATACOPY
  • [229] ADDRESS
  • [230] ORIGIN
  • [231] ORIGIN
  • [232] CALLER
  • [233] PUSH2 0x3232
  • [234] CALLDATASIZE
  • [235] PUSH5 0x3639366537
  • [236] CALLVALUE
  • [237] ORIGIN
  • [238] ORIGIN
  • [239] ORIGIN
  • [240] PUSH4 0x32323734
  • [241] CALLDATASIZE
  • [242] CODECOPY
  • [243] CALLDATASIZE
  • [244] CALLER
  • [245] CALLDATASIZE
  • [246] PUSH3 0x323233
  • [247] PUSH2 0x3232
  • [248] CALLDATASIZE
  • [249] CALLDATASIZE
  • [250] CALLDATASIZE
  • [251] BALANCE
  • [252] CALLDATASIZE
  • [253] CODECOPY
  • [254] CALLDATACOPY
  • [255] ORIGIN
  • [256] ORIGIN
  • [257] ORIGIN
  • [258] ORIGIN
  • [259] PUSH4 0x32323631
  • [260] CALLDATASIZE
  • [261] PUSH5 0x3734323233
  • [262] PUSH2 0x3232
  • [263] CALLER
  • [264] BALANCE
  • [265] CALLER
  • [266] ADDRESS
  • [267] CALLER
  • [268] ADDRESS
  • [269] CALLER
  • [270] ADDRESS
  • [271] ORIGIN
  • [272] ORIGIN
  • [273] CALLDATACOPY
  • [274] PUSH5 0xa264697066
  • [275] PUSH20 0x58221220efe0e63230188af2c08375e98e237d15
  • [276] 'eb'(Unknown Opcode)
  • [277] BYTE
  • [278] DUP1
  • [279] PUSH2 0x242a
  • [280] 'cd'(Unknown Opcode)
  • [281] ISZERO
  • [282] BASEFEE
  • [283] DUP7
  • [284] SELFBALANCE
  • [285] DUP14
  • [286] '26'(Unknown Opcode)
  • [287] SWAP14
  • [288] 'd7'(Unknown Opcode)
  • [289] 'f8'(Unknown Opcode)
  • [290] PUSH5 0x736f6c6343
  • [291] STOP
  • [292] ADDMOD
  • [293] SGT
  • [294] STOP
  • [295] CALLER