Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x0010
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0036
  • [17] JUMPI
  • [18] PUSH1 0x00
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x75b238fc
  • [24] EQ
  • [25] PUSH2 0x003b
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0x76eb8964
  • [29] EQ
  • [30] PUSH2 0x0074
  • [31] JUMPI
  • [32] JUMPDEST
  • [33] PUSH1 0x00
  • [34] DUP1
  • [35] REVERT
  • [36] JUMPDEST
  • [37] PUSH2 0x0062
  • [38] PUSH32 0xa49807205ce4d355092ef5a8a18f56e8913cf4a201fbe287825b095693c21775
  • [39] DUP2
  • [40] JUMP
  • [41] JUMPDEST
  • [42] PUSH1 0x40
  • [43] MLOAD
  • [44] SWAP1
  • [45] DUP2
  • [46] MSTORE
  • [47] PUSH1 0x20
  • [48] ADD
  • [49] PUSH1 0x40
  • [50] MLOAD
  • [51] DUP1
  • [52] SWAP2
  • [53] SUB
  • [54] SWAP1
  • [55] RETURN
  • [56] JUMPDEST
  • [57] PUSH2 0x0062
  • [58] PUSH2 0x0082
  • [59] CALLDATASIZE
  • [60] PUSH1 0x04
  • [61] PUSH2 0x016b
  • [62] JUMP
  • [63] JUMPDEST
  • [64] PUSH1 0x00
  • [65] DUP3
  • [66] TIMESTAMP
  • [67] GT
  • [68] ISZERO
  • [69] PUSH2 0x00d3
  • [70] JUMPI
  • [71] PUSH1 0x40
  • [72] MLOAD
  • [73] PUSH3 0x461bcd
  • [74] PUSH1 0xe5
  • [75] SHL
  • [76] DUP2
  • [77] MSTORE
  • [78] PUSH1 0x20
  • [79] PUSH1 0x04
  • [80] DUP3
  • [81] ADD
  • [82] MSTORE
  • [83] PUSH1 0x18
  • [84] PUSH1 0x24
  • [85] DUP3
  • [86] ADD
  • [87] MSTORE
  • [88] PUSH24 0x14ddd85c08191958591b1a5b99481a185cc81c185cdcd959
  • [89] PUSH1 0x42
  • [90] SHL
  • [91] PUSH1 0x44
  • [92] DUP3
  • [93] ADD
  • [94] MSTORE
  • [95] PUSH1 0x64
  • [96] ADD
  • [97] PUSH1 0x40
  • [98] MLOAD
  • [99] DUP1
  • [100] SWAP2
  • [101] SUB
  • [102] SWAP1
  • [103] REVERT
  • [104] JUMPDEST
  • [105] PUSH1 0x40
  • [106] MLOAD
  • [107] PUSH4 0xa9059cbb
  • [108] PUSH1 0xe0
  • [109] SHL
  • [110] DUP2
  • [111] MSTORE
  • [112] CALLER
  • [113] PUSH1 0x04
  • [114] DUP3
  • [115] ADD
  • [116] MSTORE
  • [117] PUSH1 0x24
  • [118] DUP2
  • [119] ADD
  • [120] DUP6
  • [121] SWAP1
  • [122] MSTORE
  • [123] PUSH1 0x01
  • [124] PUSH1 0x01
  • [125] PUSH1 0xa0
  • [126] SHL
  • [127] SUB
  • [128] DUP7
  • [129] AND
  • [130] SWAP1
  • [131] PUSH4 0xa9059cbb
  • [132] SWAP1
  • [133] PUSH1 0x44
  • [134] ADD
  • [135] PUSH1 0x20
  • [136] PUSH1 0x40
  • [137] MLOAD
  • [138] DUP1
  • [139] DUP4
  • [140] SUB
  • [141] DUP2
  • [142] PUSH1 0x00
  • [143] DUP8
  • [144] GAS
  • [145] CALL
  • [146] ISZERO
  • [147] DUP1
  • [148] ISZERO
  • [149] PUSH2 0x0120
  • [150] JUMPI
  • [151] RETURNDATASIZE
  • [152] PUSH1 0x00
  • [153] DUP1
  • [154] RETURNDATACOPY
  • [155] RETURNDATASIZE
  • [156] PUSH1 0x00
  • [157] REVERT
  • [158] JUMPDEST
  • [159] POP
  • [160] POP
  • [161] POP
  • [162] POP
  • [163] PUSH1 0x40
  • [164] MLOAD
  • [165] RETURNDATASIZE
  • [166] PUSH1 0x1f
  • [167] NOT
  • [168] PUSH1 0x1f
  • [169] DUP3
  • [170] ADD
  • [171] AND
  • [172] DUP3
  • [173] ADD
  • [174] DUP1
  • [175] PUSH1 0x40
  • [176] MSTORE
  • [177] POP
  • [178] DUP2
  • [179] ADD
  • [180] SWAP1
  • [181] PUSH2 0x0144
  • [182] SWAP2
  • [183] SWAP1
  • [184] PUSH2 0x01b8
  • [185] JUMP
  • [186] JUMPDEST
  • [187] POP
  • [188] SWAP3
  • [189] SWAP6
  • [190] SWAP5
  • [191] POP
  • [192] POP
  • [193] POP
  • [194] POP
  • [195] POP
  • [196] JUMP
  • [197] JUMPDEST
  • [198] DUP1
  • [199] CALLDATALOAD
  • [200] PUSH1 0x01
  • [201] PUSH1 0x01
  • [202] PUSH1 0xa0
  • [203] SHL
  • [204] SUB
  • [205] DUP2
  • [206] AND
  • [207] DUP2
  • [208] EQ
  • [209] PUSH2 0x0166
  • [210] JUMPI
  • [211] PUSH1 0x00
  • [212] DUP1
  • [213] REVERT
  • [214] JUMPDEST
  • [215] SWAP2
  • [216] SWAP1
  • [217] POP
  • [218] JUMP
  • [219] JUMPDEST
  • [220] PUSH1 0x00
  • [221] DUP1
  • [222] PUSH1 0x00
  • [223] DUP1
  • [224] PUSH1 0x00
  • [225] PUSH1 0xa0
  • [226] DUP7
  • [227] DUP9
  • [228] SUB
  • [229] SLT
  • [230] ISZERO
  • [231] PUSH2 0x0183
  • [232] JUMPI
  • [233] PUSH1 0x00
  • [234] DUP1
  • [235] REVERT
  • [236] JUMPDEST
  • [237] PUSH2 0x018c
  • [238] DUP7
  • [239] PUSH2 0x014f
  • [240] JUMP
  • [241] JUMPDEST
  • [242] SWAP5
  • [243] POP
  • [244] PUSH2 0x019a
  • [245] PUSH1 0x20
  • [246] DUP8
  • [247] ADD
  • [248] PUSH2 0x014f
  • [249] JUMP
  • [250] JUMPDEST
  • [251] SWAP5
  • [252] SWAP8
  • [253] SWAP5
  • [254] SWAP7
  • [255] POP
  • [256] POP
  • [257] POP
  • [258] POP
  • [259] PUSH1 0x40
  • [260] DUP4
  • [261] ADD
  • [262] CALLDATALOAD
  • [263] SWAP3
  • [264] PUSH1 0x60
  • [265] DUP2
  • [266] ADD
  • [267] CALLDATALOAD
  • [268] SWAP3
  • [269] PUSH1 0x80
  • [270] SWAP1
  • [271] SWAP2
  • [272] ADD
  • [273] CALLDATALOAD
  • [274] SWAP2
  • [275] POP
  • [276] JUMP
  • [277] JUMPDEST
  • [278] PUSH1 0x00
  • [279] PUSH1 0x20
  • [280] DUP3
  • [281] DUP5
  • [282] SUB
  • [283] SLT
  • [284] ISZERO
  • [285] PUSH2 0x01ca
  • [286] JUMPI
  • [287] PUSH1 0x00
  • [288] DUP1
  • [289] REVERT
  • [290] JUMPDEST
  • [291] DUP2
  • [292] MLOAD
  • [293] DUP1
  • [294] ISZERO
  • [295] ISZERO
  • [296] DUP2
  • [297] EQ
  • [298] PUSH2 0x01da
  • [299] JUMPI
  • [300] PUSH1 0x00
  • [301] DUP1
  • [302] REVERT
  • [303] JUMPDEST
  • [304] SWAP4
  • [305] SWAP3
  • [306] POP
  • [307] POP
  • [308] POP
  • [309] JUMP
  • [310] 'fe'(Unknown Opcode)
  • [311] LOG2
  • [312] PUSH5 0x6970667358
  • [313] '22'(Unknown Opcode)
  • [314] SLT
  • [315] SHA3
  • [316] DUP9
  • [317] '2f'(Unknown Opcode)
  • [318] DUP6
  • [319] 'd8'(Unknown Opcode)
  • [320] SLOAD
  • [321] 'c4'(Unknown Opcode)
  • [322] 'f6'(Unknown Opcode)
  • [323] SWAP4
  • [324] 'e5'(Unknown Opcode)
  • [325] 'a5'(Unknown Opcode)
  • [326] BLOBHASH
  • [327] PUSH13 0xbe974bd3e75d48e24b2758aff5
  • [328] ADDMOD
  • [329] GASPRICE
  • [330] SDIV
  • [331] '1f'(Unknown Opcode)
  • [332] 'c4'(Unknown Opcode)
  • [333] 'a7'(Unknown Opcode)
  • [334] SHA3
  • [335] PUSH5 0x736f6c6343
  • [336] STOP
  • [337] ADDMOD
  • [338] XOR
  • [339] STOP
  • [340] CALLER