Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x0010
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0067
  • [17] JUMPI
  • [18] PUSH1 0x00
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x6fb84102
  • [24] GT
  • [25] PUSH2 0x0050
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0x6fb84102
  • [29] EQ
  • [30] PUSH2 0x00c5
  • [31] JUMPI
  • [32] DUP1
  • [33] PUSH4 0xb82e16e3
  • [34] EQ
  • [35] PUSH2 0x00d8
  • [36] JUMPI
  • [37] DUP1
  • [38] PUSH4 0xd30bedbc
  • [39] EQ
  • [40] PUSH2 0x00ed
  • [41] JUMPI
  • [42] PUSH1 0x00
  • [43] DUP1
  • [44] REVERT
  • [45] JUMPDEST
  • [46] DUP1
  • [47] PUSH4 0x32ecfa8c
  • [48] EQ
  • [49] PUSH2 0x006c
  • [50] JUMPI
  • [51] DUP1
  • [52] PUSH4 0x3e32a381
  • [53] EQ
  • [54] PUSH2 0x00b0
  • [55] JUMPI
  • [56] JUMPDEST
  • [57] PUSH1 0x00
  • [58] DUP1
  • [59] REVERT
  • [60] JUMPDEST
  • [61] PUSH1 0x02
  • [62] SLOAD
  • [63] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [64] AND
  • [65] JUMPDEST
  • [66] PUSH1 0x40
  • [67] MLOAD
  • [68] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [69] SWAP1
  • [70] SWAP2
  • [71] AND
  • [72] DUP2
  • [73] MSTORE
  • [74] PUSH1 0x20
  • [75] ADD
  • [76] JUMPDEST
  • [77] PUSH1 0x40
  • [78] MLOAD
  • [79] DUP1
  • [80] SWAP2
  • [81] SUB
  • [82] SWAP1
  • [83] RETURN
  • [84] JUMPDEST
  • [85] PUSH2 0x00c3
  • [86] PUSH2 0x00be
  • [87] CALLDATASIZE
  • [88] PUSH1 0x04
  • [89] PUSH2 0x0251
  • [90] JUMP
  • [91] JUMPDEST
  • [92] PUSH2 0x010b
  • [93] JUMP
  • [94] JUMPDEST
  • [95] STOP
  • [96] JUMPDEST
  • [97] PUSH2 0x00c3
  • [98] PUSH2 0x00d3
  • [99] CALLDATASIZE
  • [100] PUSH1 0x04
  • [101] PUSH2 0x028e
  • [102] JUMP
  • [103] JUMPDEST
  • [104] PUSH2 0x015a
  • [105] JUMP
  • [106] JUMPDEST
  • [107] PUSH2 0x00e0
  • [108] PUSH2 0x016d
  • [109] JUMP
  • [110] JUMPDEST
  • [111] PUSH1 0x40
  • [112] MLOAD
  • [113] PUSH2 0x00a7
  • [114] SWAP2
  • [115] SWAP1
  • [116] PUSH2 0x02b0
  • [117] JUMP
  • [118] JUMPDEST
  • [119] PUSH1 0x07
  • [120] SLOAD
  • [121] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [122] AND
  • [123] PUSH2 0x0086
  • [124] JUMP
  • [125] JUMPDEST
  • [126] PUSH2 0x0113
  • [127] PUSH2 0x01df
  • [128] JUMP
  • [129] JUMPDEST
  • [130] PUSH1 0x07
  • [131] DUP1
  • [132] SLOAD
  • [133] PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
  • [134] AND
  • [135] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [136] SWAP3
  • [137] SWAP1
  • [138] SWAP3
  • [139] AND
  • [140] SWAP2
  • [141] SWAP1
  • [142] SWAP2
  • [143] OR
  • [144] SWAP1
  • [145] SSTORE
  • [146] JUMP
  • [147] JUMPDEST
  • [148] PUSH2 0x0162
  • [149] PUSH2 0x01df
  • [150] JUMP
  • [151] JUMPDEST
  • [152] PUSH1 0x04
  • [153] SWAP2
  • [154] SWAP1
  • [155] SWAP2
  • [156] SSTORE
  • [157] PUSH1 0x03
  • [158] SSTORE
  • [159] JUMP
  • [160] JUMPDEST
  • [161] PUSH1 0x60
  • [162] PUSH1 0x00
  • [163] PUSH1 0x06
  • [164] ADD
  • [165] DUP1
  • [166] SLOAD
  • [167] DUP1
  • [168] PUSH1 0x20
  • [169] MUL
  • [170] PUSH1 0x20
  • [171] ADD
  • [172] PUSH1 0x40
  • [173] MLOAD
  • [174] SWAP1
  • [175] DUP2
  • [176] ADD
  • [177] PUSH1 0x40
  • [178] MSTORE
  • [179] DUP1
  • [180] SWAP3
  • [181] SWAP2
  • [182] SWAP1
  • [183] DUP2
  • [184] DUP2
  • [185] MSTORE
  • [186] PUSH1 0x20
  • [187] ADD
  • [188] DUP3
  • [189] DUP1
  • [190] SLOAD
  • [191] DUP1
  • [192] ISZERO
  • [193] PUSH2 0x01d5
  • [194] JUMPI
  • [195] PUSH1 0x20
  • [196] MUL
  • [197] DUP3
  • [198] ADD
  • [199] SWAP2
  • [200] SWAP1
  • [201] PUSH1 0x00
  • [202] MSTORE
  • [203] PUSH1 0x20
  • [204] PUSH1 0x00
  • [205] SHA3
  • [206] SWAP1
  • [207] JUMPDEST
  • [208] DUP2
  • [209] SLOAD
  • [210] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [211] AND
  • [212] DUP2
  • [213] MSTORE
  • [214] PUSH1 0x01
  • [215] SWAP1
  • [216] SWAP2
  • [217] ADD
  • [218] SWAP1
  • [219] PUSH1 0x20
  • [220] ADD
  • [221] DUP1
  • [222] DUP4
  • [223] GT
  • [224] PUSH2 0x01aa
  • [225] JUMPI
  • [226] JUMPDEST
  • [227] POP
  • [228] POP
  • [229] POP
  • [230] POP
  • [231] POP
  • [232] SWAP1
  • [233] POP
  • [234] SWAP1
  • [235] JUMP
  • [236] JUMPDEST
  • [237] PUSH32 0xc8fcad8db84d3cc18b4c41d551ea0ee66dd599cde068d998e57d5e09332c1320
  • [238] SLOAD
  • [239] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [240] AND
  • [241] CALLER
  • [242] EQ
  • [243] PUSH2 0x024f
  • [244] JUMPI
  • [245] PUSH1 0x40
  • [246] MLOAD
  • [247] PUSH32 0x44b7c5e900000000000000000000000000000000000000000000000000000000
  • [248] DUP2
  • [249] MSTORE
  • [250] PUSH1 0x04
  • [251] ADD
  • [252] PUSH1 0x40
  • [253] MLOAD
  • [254] DUP1
  • [255] SWAP2
  • [256] SUB
  • [257] SWAP1
  • [258] REVERT
  • [259] JUMPDEST
  • [260] JUMP
  • [261] JUMPDEST
  • [262] PUSH1 0x00
  • [263] PUSH1 0x20
  • [264] DUP3
  • [265] DUP5
  • [266] SUB
  • [267] SLT
  • [268] ISZERO
  • [269] PUSH2 0x0263
  • [270] JUMPI
  • [271] PUSH1 0x00
  • [272] DUP1
  • [273] REVERT
  • [274] JUMPDEST
  • [275] DUP2
  • [276] CALLDATALOAD
  • [277] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [278] DUP2
  • [279] AND
  • [280] DUP2
  • [281] EQ
  • [282] PUSH2 0x0287
  • [283] JUMPI
  • [284] PUSH1 0x00
  • [285] DUP1
  • [286] REVERT
  • [287] JUMPDEST
  • [288] SWAP4
  • [289] SWAP3
  • [290] POP
  • [291] POP
  • [292] POP
  • [293] JUMP
  • [294] JUMPDEST
  • [295] PUSH1 0x00
  • [296] DUP1
  • [297] PUSH1 0x40
  • [298] DUP4
  • [299] DUP6
  • [300] SUB
  • [301] SLT
  • [302] ISZERO
  • [303] PUSH2 0x02a1
  • [304] JUMPI
  • [305] PUSH1 0x00
  • [306] DUP1
  • [307] REVERT
  • [308] JUMPDEST
  • [309] POP
  • [310] POP
  • [311] DUP1
  • [312] CALLDATALOAD
  • [313] SWAP3
  • [314] PUSH1 0x20
  • [315] SWAP1
  • [316] SWAP2
  • [317] ADD
  • [318] CALLDATALOAD
  • [319] SWAP2
  • [320] POP
  • [321] JUMP
  • [322] JUMPDEST
  • [323] PUSH1 0x20
  • [324] DUP1
  • [325] DUP3
  • [326] MSTORE
  • [327] DUP3
  • [328] MLOAD
  • [329] DUP3
  • [330] DUP3
  • [331] ADD
  • [332] DUP2
  • [333] SWAP1
  • [334] MSTORE
  • [335] PUSH1 0x00
  • [336] SWAP2
  • [337] SWAP1
  • [338] DUP5
  • [339] DUP3
  • [340] ADD
  • [341] SWAP1
  • [342] PUSH1 0x40
  • [343] DUP6
  • [344] ADD
  • [345] SWAP1
  • [346] DUP5
  • [347] JUMPDEST
  • [348] DUP2
  • [349] DUP2
  • [350] LT
  • [351] ISZERO
  • [352] PUSH2 0x02fe
  • [353] JUMPI
  • [354] DUP4
  • [355] MLOAD
  • [356] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [357] AND
  • [358] DUP4
  • [359] MSTORE
  • [360] SWAP3
  • [361] DUP5
  • [362] ADD
  • [363] SWAP3
  • [364] SWAP2
  • [365] DUP5
  • [366] ADD
  • [367] SWAP2
  • [368] PUSH1 0x01
  • [369] ADD
  • [370] PUSH2 0x02cc
  • [371] JUMP
  • [372] JUMPDEST
  • [373] POP
  • [374] SWAP1
  • [375] SWAP7
  • [376] SWAP6
  • [377] POP
  • [378] POP
  • [379] POP
  • [380] POP
  • [381] POP
  • [382] POP
  • [383] JUMP
  • [384] 'fe'(Unknown Opcode)
  • [385] LOG2
  • [386] PUSH5 0x6970667358
  • [387] '22'(Unknown Opcode)
  • [388] SLT
  • [389] SHA3
  • [390] 'd6'(Unknown Opcode)
  • [391] SIGNEXTEND
  • [392] PUSH23 0xf43b3b8b05cf8fcfe41b7a86f7d6f5f685383fe18fd821
  • [393] '0f'(Unknown Opcode)
  • [394] MOD
  • [395] BLOBBASEFEE
  • [396] 'a5'(Unknown Opcode)
  • [397] SWAP15
  • [398] BYTE
  • [399] PUSH5 0x736f6c6343
  • [400] STOP
  • [401] ADDMOD
  • [402] OR
  • [403] STOP
  • [404] CALLER