Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH32 0x5c60da1b00000000000000000000000000000000000000000000000000000000
  • [4] PUSH1 0x80
  • [5] MSTORE
  • [6] PUSH1 0x20
  • [7] PUSH1 0x80
  • [8] PUSH1 0x04
  • [9] DUP2
  • [10] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [11] PUSH32 0x000000000000000000000000695728df7dcc7b105ee2a6c883b6721267b3eb58
  • [12] AND
  • [13] GAS
  • [14] STATICCALL
  • [15] DUP1
  • [16] ISZERO
  • [17] PUSH2 0x010a
  • [18] JUMPI
  • [19] PUSH1 0x00
  • [20] SWAP1
  • [21] ISZERO
  • [22] PUSH2 0x0168
  • [23] JUMPI
  • [24] POP
  • [25] PUSH1 0x20
  • [26] RETURNDATASIZE
  • [27] PUSH1 0x20
  • [28] GT
  • [29] PUSH2 0x0103
  • [30] JUMPI
  • [31] JUMPDEST
  • [32] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe0
  • [33] PUSH1 0x1f
  • [34] DUP3
  • [35] ADD
  • [36] AND
  • [37] PUSH1 0x80
  • [38] ADD
  • [39] SWAP1
  • [40] PUSH1 0x80
  • [41] DUP3
  • [42] LT
  • [43] PUSH8 0xffffffffffffffff
  • [44] DUP4
  • [45] GT
  • [46] OR
  • [47] PUSH2 0x00d4
  • [48] JUMPI
  • [49] PUSH2 0x00cf
  • [50] SWAP2
  • [51] PUSH1 0x40
  • [52] MSTORE
  • [53] PUSH1 0x80
  • [54] ADD
  • [55] PUSH2 0x0116
  • [56] JUMP
  • [57] JUMPDEST
  • [58] PUSH2 0x0168
  • [59] JUMP
  • [60] JUMPDEST
  • [61] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
  • [62] PUSH1 0x00
  • [63] MSTORE
  • [64] PUSH1 0x41
  • [65] PUSH1 0x04
  • [66] MSTORE
  • [67] PUSH1 0x24
  • [68] PUSH1 0x00
  • [69] REVERT
  • [70] JUMPDEST
  • [71] POP
  • [72] RETURNDATASIZE
  • [73] PUSH2 0x0082
  • [74] JUMP
  • [75] JUMPDEST
  • [76] PUSH1 0x40
  • [77] MLOAD
  • [78] RETURNDATASIZE
  • [79] PUSH1 0x00
  • [80] DUP3
  • [81] RETURNDATACOPY
  • [82] RETURNDATASIZE
  • [83] SWAP1
  • [84] REVERT
  • [85] JUMPDEST
  • [86] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff80
  • [87] PUSH1 0x20
  • [88] SWAP2
  • [89] ADD
  • [90] SLT
  • [91] PUSH2 0x0163
  • [92] JUMPI
  • [93] PUSH1 0x80
  • [94] MLOAD
  • [95] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [96] DUP2
  • [97] AND
  • [98] DUP2
  • [99] SUB
  • [100] PUSH2 0x0163
  • [101] JUMPI
  • [102] SWAP1
  • [103] JUMP
  • [104] JUMPDEST
  • [105] PUSH1 0x00
  • [106] DUP1
  • [107] REVERT
  • [108] JUMPDEST
  • [109] PUSH1 0x00
  • [110] DUP1
  • [111] SWAP2
  • [112] CALLDATASIZE
  • [113] DUP3
  • [114] DUP1
  • [115] CALLDATACOPY
  • [116] DUP2
  • [117] CALLDATASIZE
  • [118] SWAP2
  • [119] GAS
  • [120] DELEGATECALL
  • [121] RETURNDATASIZE
  • [122] PUSH1 0x00
  • [123] DUP1
  • [124] RETURNDATACOPY
  • [125] ISZERO
  • [126] PUSH2 0x0184
  • [127] JUMPI
  • [128] RETURNDATASIZE
  • [129] PUSH1 0x00
  • [130] RETURN
  • [131] JUMPDEST
  • [132] RETURNDATASIZE
  • [133] PUSH1 0x00
  • [134] REVERT
  • [135] 'fe'(Unknown Opcode)
  • [136] LOG1
  • [137] PUSH5 0x736f6c6343
  • [138] STOP
  • [139] ADDMOD
  • [140] SHR
  • [141] STOP
  • [142] EXP