Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLVALUE
- [4] DUP1
- [5] ISZERO
- [6] PUSH2 0x000f
- [7] JUMPI
- [8] PUSH0 0x
- [9] DUP1
- [10] REVERT
- [11] JUMPDEST
- [12] POP
- [13] PUSH1 0x04
- [14] CALLDATASIZE
- [15] LT
- [16] PUSH2 0x0029
- [17] JUMPI
- [18] PUSH0 0x
- [19] CALLDATALOAD
- [20] PUSH1 0xe0
- [21] SHR
- [22] DUP1
- [23] PUSH4 0xcfae3217
- [24] EQ
- [25] PUSH2 0x002d
- [26] JUMPI
- [27] JUMPDEST
- [28] PUSH0 0x
- [29] DUP1
- [30] REVERT
- [31] JUMPDEST
- [32] PUSH2 0x0035
- [33] PUSH2 0x004b
- [34] JUMP
- [35] JUMPDEST
- [36] PUSH1 0x40
- [37] MLOAD
- [38] PUSH2 0x0042
- [39] SWAP2
- [40] SWAP1
- [41] PUSH2 0x0146
- [42] JUMP
- [43] JUMPDEST
- [44] PUSH1 0x40
- [45] MLOAD
- [46] DUP1
- [47] SWAP2
- [48] SUB
- [49] SWAP1
- [50] RETURN
- [51] JUMPDEST
- [52] PUSH0 0x
- [53] DUP1
- [54] SLOAD
- [55] PUSH2 0x0057
- [56] SWAP1
- [57] PUSH2 0x0193
- [58] JUMP
- [59] JUMPDEST
- [60] DUP1
- [61] PUSH1 0x1f
- [62] ADD
- [63] PUSH1 0x20
- [64] DUP1
- [65] SWAP2
- [66] DIV
- [67] MUL
- [68] PUSH1 0x20
- [69] ADD
- [70] PUSH1 0x40
- [71] MLOAD
- [72] SWAP1
- [73] DUP2
- [74] ADD
- [75] PUSH1 0x40
- [76] MSTORE
- [77] DUP1
- [78] SWAP3
- [79] SWAP2
- [80] SWAP1
- [81] DUP2
- [82] DUP2
- [83] MSTORE
- [84] PUSH1 0x20
- [85] ADD
- [86] DUP3
- [87] DUP1
- [88] SLOAD
- [89] PUSH2 0x0083
- [90] SWAP1
- [91] PUSH2 0x0193
- [92] JUMP
- [93] JUMPDEST
- [94] DUP1
- [95] ISZERO
- [96] PUSH2 0x00ce
- [97] JUMPI
- [98] DUP1
- [99] PUSH1 0x1f
- [100] LT
- [101] PUSH2 0x00a5
- [102] JUMPI
- [103] PUSH2 0x0100
- [104] DUP1
- [105] DUP4
- [106] SLOAD
- [107] DIV
- [108] MUL
- [109] DUP4
- [110] MSTORE
- [111] SWAP2
- [112] PUSH1 0x20
- [113] ADD
- [114] SWAP2
- [115] PUSH2 0x00ce
- [116] JUMP
- [117] JUMPDEST
- [118] DUP3
- [119] ADD
- [120] SWAP2
- [121] SWAP1
- [122] PUSH0 0x
- [123] MSTORE
- [124] PUSH1 0x20
- [125] PUSH0 0x
- [126] SHA3
- [127] SWAP1
- [128] JUMPDEST
- [129] DUP2
- [130] SLOAD
- [131] DUP2
- [132] MSTORE
- [133] SWAP1
- [134] PUSH1 0x01
- [135] ADD
- [136] SWAP1
- [137] PUSH1 0x20
- [138] ADD
- [139] DUP1
- [140] DUP4
- [141] GT
- [142] PUSH2 0x00b1
- [143] JUMPI
- [144] DUP3
- [145] SWAP1
- [146] SUB
- [147] PUSH1 0x1f
- [148] AND
- [149] DUP3
- [150] ADD
- [151] SWAP2
- [152] JUMPDEST
- [153] POP
- [154] POP
- [155] POP
- [156] POP
- [157] POP
- [158] DUP2
- [159] JUMP
- [160] JUMPDEST
- [161] PUSH0 0x
- [162] DUP2
- [163] MLOAD
- [164] SWAP1
- [165] POP
- [166] SWAP2
- [167] SWAP1
- [168] POP
- [169] JUMP
- [170] JUMPDEST
- [171] PUSH0 0x
- [172] DUP3
- [173] DUP3
- [174] MSTORE
- [175] PUSH1 0x20
- [176] DUP3
- [177] ADD
- [178] SWAP1
- [179] POP
- [180] SWAP3
- [181] SWAP2
- [182] POP
- [183] POP
- [184] JUMP
- [185] JUMPDEST
- [186] DUP3
- [187] DUP2
- [188] DUP4
- [189] MCOPY
- [190] PUSH0 0x
- [191] DUP4
- [192] DUP4
- [193] ADD
- [194] MSTORE
- [195] POP
- [196] POP
- [197] POP
- [198] JUMP
- [199] JUMPDEST
- [200] PUSH0 0x
- [201] PUSH1 0x1f
- [202] NOT
- [203] PUSH1 0x1f
- [204] DUP4
- [205] ADD
- [206] AND
- [207] SWAP1
- [208] POP
- [209] SWAP2
- [210] SWAP1
- [211] POP
- [212] JUMP
- [213] JUMPDEST
- [214] PUSH0 0x
- [215] PUSH2 0x0118
- [216] DUP3
- [217] PUSH2 0x00d6
- [218] JUMP
- [219] JUMPDEST
- [220] PUSH2 0x0122
- [221] DUP2
- [222] DUP6
- [223] PUSH2 0x00e0
- [224] JUMP
- [225] JUMPDEST
- [226] SWAP4
- [227] POP
- [228] PUSH2 0x0132
- [229] DUP2
- [230] DUP6
- [231] PUSH1 0x20
- [232] DUP7
- [233] ADD
- [234] PUSH2 0x00f0
- [235] JUMP
- [236] JUMPDEST
- [237] PUSH2 0x013b
- [238] DUP2
- [239] PUSH2 0x00fe
- [240] JUMP
- [241] JUMPDEST
- [242] DUP5
- [243] ADD
- [244] SWAP2
- [245] POP
- [246] POP
- [247] SWAP3
- [248] SWAP2
- [249] POP
- [250] POP
- [251] JUMP
- [252] JUMPDEST
- [253] PUSH0 0x
- [254] PUSH1 0x20
- [255] DUP3
- [256] ADD
- [257] SWAP1
- [258] POP
- [259] DUP2
- [260] DUP2
- [261] SUB
- [262] PUSH0 0x
- [263] DUP4
- [264] ADD
- [265] MSTORE
- [266] PUSH2 0x015e
- [267] DUP2
- [268] DUP5
- [269] PUSH2 0x010e
- [270] JUMP
- [271] JUMPDEST
- [272] SWAP1
- [273] POP
- [274] SWAP3
- [275] SWAP2
- [276] POP
- [277] POP
- [278] JUMP
- [279] JUMPDEST
- [280] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
- [281] PUSH0 0x
- [282] MSTORE
- [283] PUSH1 0x22
- [284] PUSH1 0x04
- [285] MSTORE
- [286] PUSH1 0x24
- [287] PUSH0 0x
- [288] REVERT
- [289] JUMPDEST
- [290] PUSH0 0x
- [291] PUSH1 0x02
- [292] DUP3
- [293] DIV
- [294] SWAP1
- [295] POP
- [296] PUSH1 0x01
- [297] DUP3
- [298] AND
- [299] DUP1
- [300] PUSH2 0x01aa
- [301] JUMPI
- [302] PUSH1 0x7f
- [303] DUP3
- [304] AND
- [305] SWAP2
- [306] POP
- [307] JUMPDEST
- [308] PUSH1 0x20
- [309] DUP3
- [310] LT
- [311] DUP2
- [312] SUB
- [313] PUSH2 0x01bd
- [314] JUMPI
- [315] PUSH2 0x01bc
- [316] PUSH2 0x0166
- [317] JUMP
- [318] JUMPDEST
- [319] JUMPDEST
- [320] POP
- [321] SWAP2
- [322] SWAP1
- [323] POP
- [324] JUMP
- [325] 'fe'(Unknown Opcode)
- [326] LOG2
- [327] PUSH5 0x6970667358
- [328] '22'(Unknown Opcode)
- [329] SLT
- [330] SHA3
- [331] DUP10
- [332] 'e7'(Unknown Opcode)
- [333] 'e5'(Unknown Opcode)
- [334] SHL
- [335] 'a7'(Unknown Opcode)
- [336] '2d'(Unknown Opcode)
- [337] 'ca'(Unknown Opcode)
- [338] SWAP12
- [339] CALLCODE
- [340] CALL
- [341] 'd6'(Unknown Opcode)
- [342] PUSH20 0x58bcc7aaf2d12360a7a588cf01f41431412cf78e
- [343] PUSH5 0x736f6c6343
- [344] STOP
- [345] ADDMOD
- [346] BYTE
- [347] STOP
- [348] CALLER