Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLVALUE
- [4] DUP1
- [5] ISZERO
- [6] PUSH2 0x0010
- [7] JUMPI
- [8] PUSH1 0x00
- [9] DUP1
- [10] REVERT
- [11] JUMPDEST
- [12] POP
- [13] PUSH1 0x04
- [14] CALLDATASIZE
- [15] LT
- [16] PUSH2 0x0067
- [17] JUMPI
- [18] PUSH1 0x00
- [19] CALLDATALOAD
- [20] PUSH1 0xe0
- [21] SHR
- [22] DUP1
- [23] PUSH4 0x6fb84102
- [24] GT
- [25] PUSH2 0x0050
- [26] JUMPI
- [27] DUP1
- [28] PUSH4 0x6fb84102
- [29] EQ
- [30] PUSH2 0x00c5
- [31] JUMPI
- [32] DUP1
- [33] PUSH4 0xb82e16e3
- [34] EQ
- [35] PUSH2 0x00d8
- [36] JUMPI
- [37] DUP1
- [38] PUSH4 0xd30bedbc
- [39] EQ
- [40] PUSH2 0x00ed
- [41] JUMPI
- [42] PUSH1 0x00
- [43] DUP1
- [44] REVERT
- [45] JUMPDEST
- [46] DUP1
- [47] PUSH4 0x32ecfa8c
- [48] EQ
- [49] PUSH2 0x006c
- [50] JUMPI
- [51] DUP1
- [52] PUSH4 0x3e32a381
- [53] EQ
- [54] PUSH2 0x00b0
- [55] JUMPI
- [56] JUMPDEST
- [57] PUSH1 0x00
- [58] DUP1
- [59] REVERT
- [60] JUMPDEST
- [61] PUSH1 0x02
- [62] SLOAD
- [63] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [64] AND
- [65] JUMPDEST
- [66] PUSH1 0x40
- [67] MLOAD
- [68] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [69] SWAP1
- [70] SWAP2
- [71] AND
- [72] DUP2
- [73] MSTORE
- [74] PUSH1 0x20
- [75] ADD
- [76] JUMPDEST
- [77] PUSH1 0x40
- [78] MLOAD
- [79] DUP1
- [80] SWAP2
- [81] SUB
- [82] SWAP1
- [83] RETURN
- [84] JUMPDEST
- [85] PUSH2 0x00c3
- [86] PUSH2 0x00be
- [87] CALLDATASIZE
- [88] PUSH1 0x04
- [89] PUSH2 0x0251
- [90] JUMP
- [91] JUMPDEST
- [92] PUSH2 0x010b
- [93] JUMP
- [94] JUMPDEST
- [95] STOP
- [96] JUMPDEST
- [97] PUSH2 0x00c3
- [98] PUSH2 0x00d3
- [99] CALLDATASIZE
- [100] PUSH1 0x04
- [101] PUSH2 0x028e
- [102] JUMP
- [103] JUMPDEST
- [104] PUSH2 0x015a
- [105] JUMP
- [106] JUMPDEST
- [107] PUSH2 0x00e0
- [108] PUSH2 0x016d
- [109] JUMP
- [110] JUMPDEST
- [111] PUSH1 0x40
- [112] MLOAD
- [113] PUSH2 0x00a7
- [114] SWAP2
- [115] SWAP1
- [116] PUSH2 0x02b0
- [117] JUMP
- [118] JUMPDEST
- [119] PUSH1 0x07
- [120] SLOAD
- [121] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [122] AND
- [123] PUSH2 0x0086
- [124] JUMP
- [125] JUMPDEST
- [126] PUSH2 0x0113
- [127] PUSH2 0x01df
- [128] JUMP
- [129] JUMPDEST
- [130] PUSH1 0x07
- [131] DUP1
- [132] SLOAD
- [133] PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
- [134] AND
- [135] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [136] SWAP3
- [137] SWAP1
- [138] SWAP3
- [139] AND
- [140] SWAP2
- [141] SWAP1
- [142] SWAP2
- [143] OR
- [144] SWAP1
- [145] SSTORE
- [146] JUMP
- [147] JUMPDEST
- [148] PUSH2 0x0162
- [149] PUSH2 0x01df
- [150] JUMP
- [151] JUMPDEST
- [152] PUSH1 0x04
- [153] SWAP2
- [154] SWAP1
- [155] SWAP2
- [156] SSTORE
- [157] PUSH1 0x03
- [158] SSTORE
- [159] JUMP
- [160] JUMPDEST
- [161] PUSH1 0x60
- [162] PUSH1 0x00
- [163] PUSH1 0x06
- [164] ADD
- [165] DUP1
- [166] SLOAD
- [167] DUP1
- [168] PUSH1 0x20
- [169] MUL
- [170] PUSH1 0x20
- [171] ADD
- [172] PUSH1 0x40
- [173] MLOAD
- [174] SWAP1
- [175] DUP2
- [176] ADD
- [177] PUSH1 0x40
- [178] MSTORE
- [179] DUP1
- [180] SWAP3
- [181] SWAP2
- [182] SWAP1
- [183] DUP2
- [184] DUP2
- [185] MSTORE
- [186] PUSH1 0x20
- [187] ADD
- [188] DUP3
- [189] DUP1
- [190] SLOAD
- [191] DUP1
- [192] ISZERO
- [193] PUSH2 0x01d5
- [194] JUMPI
- [195] PUSH1 0x20
- [196] MUL
- [197] DUP3
- [198] ADD
- [199] SWAP2
- [200] SWAP1
- [201] PUSH1 0x00
- [202] MSTORE
- [203] PUSH1 0x20
- [204] PUSH1 0x00
- [205] SHA3
- [206] SWAP1
- [207] JUMPDEST
- [208] DUP2
- [209] SLOAD
- [210] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [211] AND
- [212] DUP2
- [213] MSTORE
- [214] PUSH1 0x01
- [215] SWAP1
- [216] SWAP2
- [217] ADD
- [218] SWAP1
- [219] PUSH1 0x20
- [220] ADD
- [221] DUP1
- [222] DUP4
- [223] GT
- [224] PUSH2 0x01aa
- [225] JUMPI
- [226] JUMPDEST
- [227] POP
- [228] POP
- [229] POP
- [230] POP
- [231] POP
- [232] SWAP1
- [233] POP
- [234] SWAP1
- [235] JUMP
- [236] JUMPDEST
- [237] PUSH32 0xc8fcad8db84d3cc18b4c41d551ea0ee66dd599cde068d998e57d5e09332c1320
- [238] SLOAD
- [239] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [240] AND
- [241] CALLER
- [242] EQ
- [243] PUSH2 0x024f
- [244] JUMPI
- [245] PUSH1 0x40
- [246] MLOAD
- [247] PUSH32 0x44b7c5e900000000000000000000000000000000000000000000000000000000
- [248] DUP2
- [249] MSTORE
- [250] PUSH1 0x04
- [251] ADD
- [252] PUSH1 0x40
- [253] MLOAD
- [254] DUP1
- [255] SWAP2
- [256] SUB
- [257] SWAP1
- [258] REVERT
- [259] JUMPDEST
- [260] JUMP
- [261] JUMPDEST
- [262] PUSH1 0x00
- [263] PUSH1 0x20
- [264] DUP3
- [265] DUP5
- [266] SUB
- [267] SLT
- [268] ISZERO
- [269] PUSH2 0x0263
- [270] JUMPI
- [271] PUSH1 0x00
- [272] DUP1
- [273] REVERT
- [274] JUMPDEST
- [275] DUP2
- [276] CALLDATALOAD
- [277] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [278] DUP2
- [279] AND
- [280] DUP2
- [281] EQ
- [282] PUSH2 0x0287
- [283] JUMPI
- [284] PUSH1 0x00
- [285] DUP1
- [286] REVERT
- [287] JUMPDEST
- [288] SWAP4
- [289] SWAP3
- [290] POP
- [291] POP
- [292] POP
- [293] JUMP
- [294] JUMPDEST
- [295] PUSH1 0x00
- [296] DUP1
- [297] PUSH1 0x40
- [298] DUP4
- [299] DUP6
- [300] SUB
- [301] SLT
- [302] ISZERO
- [303] PUSH2 0x02a1
- [304] JUMPI
- [305] PUSH1 0x00
- [306] DUP1
- [307] REVERT
- [308] JUMPDEST
- [309] POP
- [310] POP
- [311] DUP1
- [312] CALLDATALOAD
- [313] SWAP3
- [314] PUSH1 0x20
- [315] SWAP1
- [316] SWAP2
- [317] ADD
- [318] CALLDATALOAD
- [319] SWAP2
- [320] POP
- [321] JUMP
- [322] JUMPDEST
- [323] PUSH1 0x20
- [324] DUP1
- [325] DUP3
- [326] MSTORE
- [327] DUP3
- [328] MLOAD
- [329] DUP3
- [330] DUP3
- [331] ADD
- [332] DUP2
- [333] SWAP1
- [334] MSTORE
- [335] PUSH1 0x00
- [336] SWAP2
- [337] SWAP1
- [338] DUP5
- [339] DUP3
- [340] ADD
- [341] SWAP1
- [342] PUSH1 0x40
- [343] DUP6
- [344] ADD
- [345] SWAP1
- [346] DUP5
- [347] JUMPDEST
- [348] DUP2
- [349] DUP2
- [350] LT
- [351] ISZERO
- [352] PUSH2 0x02fe
- [353] JUMPI
- [354] DUP4
- [355] MLOAD
- [356] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [357] AND
- [358] DUP4
- [359] MSTORE
- [360] SWAP3
- [361] DUP5
- [362] ADD
- [363] SWAP3
- [364] SWAP2
- [365] DUP5
- [366] ADD
- [367] SWAP2
- [368] PUSH1 0x01
- [369] ADD
- [370] PUSH2 0x02cc
- [371] JUMP
- [372] JUMPDEST
- [373] POP
- [374] SWAP1
- [375] SWAP7
- [376] SWAP6
- [377] POP
- [378] POP
- [379] POP
- [380] POP
- [381] POP
- [382] POP
- [383] JUMP
- [384] 'fe'(Unknown Opcode)
- [385] LOG2
- [386] PUSH5 0x6970667358
- [387] '22'(Unknown Opcode)
- [388] SLT
- [389] SHA3
- [390] 'd6'(Unknown Opcode)
- [391] SIGNEXTEND
- [392] PUSH23 0xf43b3b8b05cf8fcfe41b7a86f7d6f5f685383fe18fd821
- [393] '0f'(Unknown Opcode)
- [394] MOD
- [395] BLOBBASEFEE
- [396] 'a5'(Unknown Opcode)
- [397] SWAP15
- [398] BYTE
- [399] PUSH5 0x736f6c6343
- [400] STOP
- [401] ADDMOD
- [402] OR
- [403] STOP
- [404] CALLER