Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLVALUE
- [4] DUP1
- [5] ISZERO
- [6] PUSH2 0x0010
- [7] JUMPI
- [8] PUSH1 0x00
- [9] DUP1
- [10] REVERT
- [11] JUMPDEST
- [12] POP
- [13] PUSH1 0x04
- [14] CALLDATASIZE
- [15] LT
- [16] PUSH2 0x0036
- [17] JUMPI
- [18] PUSH1 0x00
- [19] CALLDATALOAD
- [20] PUSH1 0xe0
- [21] SHR
- [22] DUP1
- [23] PUSH4 0x75b238fc
- [24] EQ
- [25] PUSH2 0x003b
- [26] JUMPI
- [27] DUP1
- [28] PUSH4 0x76eb8964
- [29] EQ
- [30] PUSH2 0x0074
- [31] JUMPI
- [32] JUMPDEST
- [33] PUSH1 0x00
- [34] DUP1
- [35] REVERT
- [36] JUMPDEST
- [37] PUSH2 0x0062
- [38] PUSH32 0xa49807205ce4d355092ef5a8a18f56e8913cf4a201fbe287825b095693c21775
- [39] DUP2
- [40] JUMP
- [41] JUMPDEST
- [42] PUSH1 0x40
- [43] MLOAD
- [44] SWAP1
- [45] DUP2
- [46] MSTORE
- [47] PUSH1 0x20
- [48] ADD
- [49] PUSH1 0x40
- [50] MLOAD
- [51] DUP1
- [52] SWAP2
- [53] SUB
- [54] SWAP1
- [55] RETURN
- [56] JUMPDEST
- [57] PUSH2 0x0062
- [58] PUSH2 0x0082
- [59] CALLDATASIZE
- [60] PUSH1 0x04
- [61] PUSH2 0x016b
- [62] JUMP
- [63] JUMPDEST
- [64] PUSH1 0x00
- [65] DUP3
- [66] TIMESTAMP
- [67] GT
- [68] ISZERO
- [69] PUSH2 0x00d3
- [70] JUMPI
- [71] PUSH1 0x40
- [72] MLOAD
- [73] PUSH3 0x461bcd
- [74] PUSH1 0xe5
- [75] SHL
- [76] DUP2
- [77] MSTORE
- [78] PUSH1 0x20
- [79] PUSH1 0x04
- [80] DUP3
- [81] ADD
- [82] MSTORE
- [83] PUSH1 0x18
- [84] PUSH1 0x24
- [85] DUP3
- [86] ADD
- [87] MSTORE
- [88] PUSH24 0x14ddd85c08191958591b1a5b99481a185cc81c185cdcd959
- [89] PUSH1 0x42
- [90] SHL
- [91] PUSH1 0x44
- [92] DUP3
- [93] ADD
- [94] MSTORE
- [95] PUSH1 0x64
- [96] ADD
- [97] PUSH1 0x40
- [98] MLOAD
- [99] DUP1
- [100] SWAP2
- [101] SUB
- [102] SWAP1
- [103] REVERT
- [104] JUMPDEST
- [105] PUSH1 0x40
- [106] MLOAD
- [107] PUSH4 0xa9059cbb
- [108] PUSH1 0xe0
- [109] SHL
- [110] DUP2
- [111] MSTORE
- [112] CALLER
- [113] PUSH1 0x04
- [114] DUP3
- [115] ADD
- [116] MSTORE
- [117] PUSH1 0x24
- [118] DUP2
- [119] ADD
- [120] DUP6
- [121] SWAP1
- [122] MSTORE
- [123] PUSH1 0x01
- [124] PUSH1 0x01
- [125] PUSH1 0xa0
- [126] SHL
- [127] SUB
- [128] DUP7
- [129] AND
- [130] SWAP1
- [131] PUSH4 0xa9059cbb
- [132] SWAP1
- [133] PUSH1 0x44
- [134] ADD
- [135] PUSH1 0x20
- [136] PUSH1 0x40
- [137] MLOAD
- [138] DUP1
- [139] DUP4
- [140] SUB
- [141] DUP2
- [142] PUSH1 0x00
- [143] DUP8
- [144] GAS
- [145] CALL
- [146] ISZERO
- [147] DUP1
- [148] ISZERO
- [149] PUSH2 0x0120
- [150] JUMPI
- [151] RETURNDATASIZE
- [152] PUSH1 0x00
- [153] DUP1
- [154] RETURNDATACOPY
- [155] RETURNDATASIZE
- [156] PUSH1 0x00
- [157] REVERT
- [158] JUMPDEST
- [159] POP
- [160] POP
- [161] POP
- [162] POP
- [163] PUSH1 0x40
- [164] MLOAD
- [165] RETURNDATASIZE
- [166] PUSH1 0x1f
- [167] NOT
- [168] PUSH1 0x1f
- [169] DUP3
- [170] ADD
- [171] AND
- [172] DUP3
- [173] ADD
- [174] DUP1
- [175] PUSH1 0x40
- [176] MSTORE
- [177] POP
- [178] DUP2
- [179] ADD
- [180] SWAP1
- [181] PUSH2 0x0144
- [182] SWAP2
- [183] SWAP1
- [184] PUSH2 0x01b8
- [185] JUMP
- [186] JUMPDEST
- [187] POP
- [188] SWAP3
- [189] SWAP6
- [190] SWAP5
- [191] POP
- [192] POP
- [193] POP
- [194] POP
- [195] POP
- [196] JUMP
- [197] JUMPDEST
- [198] DUP1
- [199] CALLDATALOAD
- [200] PUSH1 0x01
- [201] PUSH1 0x01
- [202] PUSH1 0xa0
- [203] SHL
- [204] SUB
- [205] DUP2
- [206] AND
- [207] DUP2
- [208] EQ
- [209] PUSH2 0x0166
- [210] JUMPI
- [211] PUSH1 0x00
- [212] DUP1
- [213] REVERT
- [214] JUMPDEST
- [215] SWAP2
- [216] SWAP1
- [217] POP
- [218] JUMP
- [219] JUMPDEST
- [220] PUSH1 0x00
- [221] DUP1
- [222] PUSH1 0x00
- [223] DUP1
- [224] PUSH1 0x00
- [225] PUSH1 0xa0
- [226] DUP7
- [227] DUP9
- [228] SUB
- [229] SLT
- [230] ISZERO
- [231] PUSH2 0x0183
- [232] JUMPI
- [233] PUSH1 0x00
- [234] DUP1
- [235] REVERT
- [236] JUMPDEST
- [237] PUSH2 0x018c
- [238] DUP7
- [239] PUSH2 0x014f
- [240] JUMP
- [241] JUMPDEST
- [242] SWAP5
- [243] POP
- [244] PUSH2 0x019a
- [245] PUSH1 0x20
- [246] DUP8
- [247] ADD
- [248] PUSH2 0x014f
- [249] JUMP
- [250] JUMPDEST
- [251] SWAP5
- [252] SWAP8
- [253] SWAP5
- [254] SWAP7
- [255] POP
- [256] POP
- [257] POP
- [258] POP
- [259] PUSH1 0x40
- [260] DUP4
- [261] ADD
- [262] CALLDATALOAD
- [263] SWAP3
- [264] PUSH1 0x60
- [265] DUP2
- [266] ADD
- [267] CALLDATALOAD
- [268] SWAP3
- [269] PUSH1 0x80
- [270] SWAP1
- [271] SWAP2
- [272] ADD
- [273] CALLDATALOAD
- [274] SWAP2
- [275] POP
- [276] JUMP
- [277] JUMPDEST
- [278] PUSH1 0x00
- [279] PUSH1 0x20
- [280] DUP3
- [281] DUP5
- [282] SUB
- [283] SLT
- [284] ISZERO
- [285] PUSH2 0x01ca
- [286] JUMPI
- [287] PUSH1 0x00
- [288] DUP1
- [289] REVERT
- [290] JUMPDEST
- [291] DUP2
- [292] MLOAD
- [293] DUP1
- [294] ISZERO
- [295] ISZERO
- [296] DUP2
- [297] EQ
- [298] PUSH2 0x01da
- [299] JUMPI
- [300] PUSH1 0x00
- [301] DUP1
- [302] REVERT
- [303] JUMPDEST
- [304] SWAP4
- [305] SWAP3
- [306] POP
- [307] POP
- [308] POP
- [309] JUMP
- [310] 'fe'(Unknown Opcode)
- [311] LOG2
- [312] PUSH5 0x6970667358
- [313] '22'(Unknown Opcode)
- [314] SLT
- [315] SHA3
- [316] DUP9
- [317] '2f'(Unknown Opcode)
- [318] DUP6
- [319] 'd8'(Unknown Opcode)
- [320] SLOAD
- [321] 'c4'(Unknown Opcode)
- [322] 'f6'(Unknown Opcode)
- [323] SWAP4
- [324] 'e5'(Unknown Opcode)
- [325] 'a5'(Unknown Opcode)
- [326] BLOBHASH
- [327] PUSH13 0xbe974bd3e75d48e24b2758aff5
- [328] ADDMOD
- [329] GASPRICE
- [330] SDIV
- [331] '1f'(Unknown Opcode)
- [332] 'c4'(Unknown Opcode)
- [333] 'a7'(Unknown Opcode)
- [334] SHA3
- [335] PUSH5 0x736f6c6343
- [336] STOP
- [337] ADDMOD
- [338] XOR
- [339] STOP
- [340] CALLER