Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0029
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x775c300c
  • [24] EQ
  • [25] PUSH2 0x002d
  • [26] JUMPI
  • [27] JUMPDEST
  • [28] PUSH0 0x
  • [29] DUP1
  • [30] REVERT
  • [31] JUMPDEST
  • [32] PUSH2 0x0035
  • [33] PUSH2 0x0037
  • [34] JUMP
  • [35] JUMPDEST
  • [36] STOP
  • [37] JUMPDEST
  • [38] PUSH0 0x
  • [39] PUSH1 0x40
  • [40] MLOAD
  • [41] DUP1
  • [42] PUSH1 0x40
  • [43] ADD
  • [44] PUSH1 0x40
  • [45] MSTORE
  • [46] DUP1
  • [47] PUSH1 0x13
  • [48] DUP2
  • [49] MSTORE
  • [50] PUSH1 0x20
  • [51] ADD
  • [52] PUSH32 0x6960ff60005260206000f3600052600a6016f300000000000000000000000000
  • [53] DUP2
  • [54] MSTORE
  • [55] POP
  • [56] SWAP1
  • [57] POP
  • [58] PUSH0 0x
  • [59] PUSH1 0x13
  • [60] PUSH1 0x20
  • [61] DUP4
  • [62] ADD
  • [63] PUSH0 0x
  • [64] CREATE
  • [65] SWAP1
  • [66] POP
  • [67] PUSH0 0x
  • [68] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [69] AND
  • [70] DUP2
  • [71] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [72] AND
  • [73] SUB
  • [74] PUSH2 0x00b2
  • [75] JUMPI
  • [76] PUSH0 0x
  • [77] DUP1
  • [78] REVERT
  • [79] JUMPDEST
  • [80] PUSH32 0xb8a00d6d8ca1be30bfec34d8f97e55f0f0fd9eeb7fb46e030516363d4cfe1ad6
  • [81] DUP2
  • [82] PUSH1 0x40
  • [83] MLOAD
  • [84] PUSH2 0x00e1
  • [85] SWAP2
  • [86] SWAP1
  • [87] PUSH2 0x012c
  • [88] JUMP
  • [89] JUMPDEST
  • [90] PUSH1 0x40
  • [91] MLOAD
  • [92] DUP1
  • [93] SWAP2
  • [94] SUB
  • [95] SWAP1
  • [96] LOG1
  • [97] POP
  • [98] POP
  • [99] JUMP
  • [100] JUMPDEST
  • [101] PUSH0 0x
  • [102] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [103] DUP3
  • [104] AND
  • [105] SWAP1
  • [106] POP
  • [107] SWAP2
  • [108] SWAP1
  • [109] POP
  • [110] JUMP
  • [111] JUMPDEST
  • [112] PUSH0 0x
  • [113] PUSH2 0x0116
  • [114] DUP3
  • [115] PUSH2 0x00ed
  • [116] JUMP
  • [117] JUMPDEST
  • [118] SWAP1
  • [119] POP
  • [120] SWAP2
  • [121] SWAP1
  • [122] POP
  • [123] JUMP
  • [124] JUMPDEST
  • [125] PUSH2 0x0126
  • [126] DUP2
  • [127] PUSH2 0x010c
  • [128] JUMP
  • [129] JUMPDEST
  • [130] DUP3
  • [131] MSTORE
  • [132] POP
  • [133] POP
  • [134] JUMP
  • [135] JUMPDEST
  • [136] PUSH0 0x
  • [137] PUSH1 0x20
  • [138] DUP3
  • [139] ADD
  • [140] SWAP1
  • [141] POP
  • [142] PUSH2 0x013f
  • [143] PUSH0 0x
  • [144] DUP4
  • [145] ADD
  • [146] DUP5
  • [147] PUSH2 0x011d
  • [148] JUMP
  • [149] JUMPDEST
  • [150] SWAP3
  • [151] SWAP2
  • [152] POP
  • [153] POP
  • [154] JUMP
  • [155] 'fe'(Unknown Opcode)
  • [156] LOG2
  • [157] PUSH5 0x6970667358
  • [158] '22'(Unknown Opcode)
  • [159] SLT
  • [160] SHA3
  • [161] PUSH29 0x6acf35d3bcb6e3b73dce663b22928495380f4f525c8b5e2840cd321a9b
  • [162] CALLDATALOAD
  • [163] 'af'(Unknown Opcode)
  • [164] PUSH5 0x736f6c6343
  • [165] STOP
  • [166] ADDMOD
  • [167] BYTE
  • [168] STOP
  • [169] CALLER