Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLVALUE
- [4] DUP1
- [5] ISZERO
- [6] PUSH2 0x000f
- [7] JUMPI
- [8] PUSH0 0x
- [9] DUP1
- [10] REVERT
- [11] JUMPDEST
- [12] POP
- [13] PUSH1 0x04
- [14] CALLDATASIZE
- [15] LT
- [16] PUSH2 0x0029
- [17] JUMPI
- [18] PUSH0 0x
- [19] CALLDATALOAD
- [20] PUSH1 0xe0
- [21] SHR
- [22] DUP1
- [23] PUSH4 0x80a003ff
- [24] EQ
- [25] PUSH2 0x002d
- [26] JUMPI
- [27] JUMPDEST
- [28] PUSH0 0x
- [29] DUP1
- [30] REVERT
- [31] JUMPDEST
- [32] PUSH2 0x0047
- [33] PUSH1 0x04
- [34] DUP1
- [35] CALLDATASIZE
- [36] SUB
- [37] DUP2
- [38] ADD
- [39] SWAP1
- [40] PUSH2 0x0042
- [41] SWAP2
- [42] SWAP1
- [43] PUSH2 0x00e7
- [44] JUMP
- [45] JUMPDEST
- [46] PUSH2 0x005d
- [47] JUMP
- [48] JUMPDEST
- [49] PUSH1 0x40
- [50] MLOAD
- [51] PUSH2 0x0054
- [52] SWAP2
- [53] SWAP1
- [54] PUSH2 0x016c
- [55] JUMP
- [56] JUMPDEST
- [57] PUSH1 0x40
- [58] MLOAD
- [59] DUP1
- [60] SWAP2
- [61] SUB
- [62] SWAP1
- [63] RETURN
- [64] JUMPDEST
- [65] PUSH0 0x
- [66] DUP3
- [67] DUP3
- [68] PUSH1 0x40
- [69] MLOAD
- [70] PUSH2 0x006e
- [71] SWAP3
- [72] SWAP2
- [73] SWAP1
- [74] PUSH2 0x01c1
- [75] JUMP
- [76] JUMPDEST
- [77] PUSH1 0x40
- [78] MLOAD
- [79] DUP1
- [80] SWAP2
- [81] SUB
- [82] SWAP1
- [83] SHA3
- [84] SWAP1
- [85] POP
- [86] SWAP3
- [87] SWAP2
- [88] POP
- [89] POP
- [90] JUMP
- [91] JUMPDEST
- [92] PUSH0 0x
- [93] DUP1
- [94] REVERT
- [95] JUMPDEST
- [96] PUSH0 0x
- [97] DUP1
- [98] REVERT
- [99] JUMPDEST
- [100] PUSH0 0x
- [101] DUP1
- [102] REVERT
- [103] JUMPDEST
- [104] PUSH0 0x
- [105] DUP1
- [106] REVERT
- [107] JUMPDEST
- [108] PUSH0 0x
- [109] DUP1
- [110] REVERT
- [111] JUMPDEST
- [112] PUSH0 0x
- [113] DUP1
- [114] DUP4
- [115] PUSH1 0x1f
- [116] DUP5
- [117] ADD
- [118] SLT
- [119] PUSH2 0x00a7
- [120] JUMPI
- [121] PUSH2 0x00a6
- [122] PUSH2 0x0086
- [123] JUMP
- [124] JUMPDEST
- [125] JUMPDEST
- [126] DUP3
- [127] CALLDATALOAD
- [128] SWAP1
- [129] POP
- [130] PUSH8 0xffffffffffffffff
- [131] DUP2
- [132] GT
- [133] ISZERO
- [134] PUSH2 0x00c4
- [135] JUMPI
- [136] PUSH2 0x00c3
- [137] PUSH2 0x008a
- [138] JUMP
- [139] JUMPDEST
- [140] JUMPDEST
- [141] PUSH1 0x20
- [142] DUP4
- [143] ADD
- [144] SWAP2
- [145] POP
- [146] DUP4
- [147] PUSH1 0x01
- [148] DUP3
- [149] MUL
- [150] DUP4
- [151] ADD
- [152] GT
- [153] ISZERO
- [154] PUSH2 0x00e0
- [155] JUMPI
- [156] PUSH2 0x00df
- [157] PUSH2 0x008e
- [158] JUMP
- [159] JUMPDEST
- [160] JUMPDEST
- [161] SWAP3
- [162] POP
- [163] SWAP3
- [164] SWAP1
- [165] POP
- [166] JUMP
- [167] JUMPDEST
- [168] PUSH0 0x
- [169] DUP1
- [170] PUSH1 0x20
- [171] DUP4
- [172] DUP6
- [173] SUB
- [174] SLT
- [175] ISZERO
- [176] PUSH2 0x00fd
- [177] JUMPI
- [178] PUSH2 0x00fc
- [179] PUSH2 0x007e
- [180] JUMP
- [181] JUMPDEST
- [182] JUMPDEST
- [183] PUSH0 0x
- [184] DUP4
- [185] ADD
- [186] CALLDATALOAD
- [187] PUSH8 0xffffffffffffffff
- [188] DUP2
- [189] GT
- [190] ISZERO
- [191] PUSH2 0x011a
- [192] JUMPI
- [193] PUSH2 0x0119
- [194] PUSH2 0x0082
- [195] JUMP
- [196] JUMPDEST
- [197] JUMPDEST
- [198] PUSH2 0x0126
- [199] DUP6
- [200] DUP3
- [201] DUP7
- [202] ADD
- [203] PUSH2 0x0092
- [204] JUMP
- [205] JUMPDEST
- [206] SWAP3
- [207] POP
- [208] SWAP3
- [209] POP
- [210] POP
- [211] SWAP3
- [212] POP
- [213] SWAP3
- [214] SWAP1
- [215] POP
- [216] JUMP
- [217] JUMPDEST
- [218] PUSH0 0x
- [219] PUSH32 0xffffffff00000000000000000000000000000000000000000000000000000000
- [220] DUP3
- [221] AND
- [222] SWAP1
- [223] POP
- [224] SWAP2
- [225] SWAP1
- [226] POP
- [227] JUMP
- [228] JUMPDEST
- [229] PUSH2 0x0166
- [230] DUP2
- [231] PUSH2 0x0132
- [232] JUMP
- [233] JUMPDEST
- [234] DUP3
- [235] MSTORE
- [236] POP
- [237] POP
- [238] JUMP
- [239] JUMPDEST
- [240] PUSH0 0x
- [241] PUSH1 0x20
- [242] DUP3
- [243] ADD
- [244] SWAP1
- [245] POP
- [246] PUSH2 0x017f
- [247] PUSH0 0x
- [248] DUP4
- [249] ADD
- [250] DUP5
- [251] PUSH2 0x015d
- [252] JUMP
- [253] JUMPDEST
- [254] SWAP3
- [255] SWAP2
- [256] POP
- [257] POP
- [258] JUMP
- [259] JUMPDEST
- [260] PUSH0 0x
- [261] DUP2
- [262] SWAP1
- [263] POP
- [264] SWAP3
- [265] SWAP2
- [266] POP
- [267] POP
- [268] JUMP
- [269] JUMPDEST
- [270] DUP3
- [271] DUP2
- [272] DUP4
- [273] CALLDATACOPY
- [274] PUSH0 0x
- [275] DUP4
- [276] DUP4
- [277] ADD
- [278] MSTORE
- [279] POP
- [280] POP
- [281] POP
- [282] JUMP
- [283] JUMPDEST
- [284] PUSH0 0x
- [285] PUSH2 0x01a8
- [286] DUP4
- [287] DUP6
- [288] PUSH2 0x0185
- [289] JUMP
- [290] JUMPDEST
- [291] SWAP4
- [292] POP
- [293] PUSH2 0x01b5
- [294] DUP4
- [295] DUP6
- [296] DUP5
- [297] PUSH2 0x018f
- [298] JUMP
- [299] JUMPDEST
- [300] DUP3
- [301] DUP5
- [302] ADD
- [303] SWAP1
- [304] POP
- [305] SWAP4
- [306] SWAP3
- [307] POP
- [308] POP
- [309] POP
- [310] JUMP
- [311] JUMPDEST
- [312] PUSH0 0x
- [313] PUSH2 0x01cd
- [314] DUP3
- [315] DUP5
- [316] DUP7
- [317] PUSH2 0x019d
- [318] JUMP
- [319] JUMPDEST
- [320] SWAP2
- [321] POP
- [322] DUP2
- [323] SWAP1
- [324] POP
- [325] SWAP4
- [326] SWAP3
- [327] POP
- [328] POP
- [329] POP
- [330] JUMP
- [331] 'fe'(Unknown Opcode)
- [332] LOG2
- [333] PUSH5 0x6970667358
- [334] '22'(Unknown Opcode)
- [335] SLT
- [336] SHA3
- [337] PUSH17 0xedeb5848336211f9fc6c4785fc371da273
- [338] XOR
- [339] '4d'(Unknown Opcode)
- [340] JUMP
- [341] GASPRICE
- [342] 'e3'(Unknown Opcode)
- [343] PUSH19 0x571c6c8e61ce228a64736f6c634300081a0033