Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0029
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x80a003ff
  • [24] EQ
  • [25] PUSH2 0x002d
  • [26] JUMPI
  • [27] JUMPDEST
  • [28] PUSH0 0x
  • [29] DUP1
  • [30] REVERT
  • [31] JUMPDEST
  • [32] PUSH2 0x0047
  • [33] PUSH1 0x04
  • [34] DUP1
  • [35] CALLDATASIZE
  • [36] SUB
  • [37] DUP2
  • [38] ADD
  • [39] SWAP1
  • [40] PUSH2 0x0042
  • [41] SWAP2
  • [42] SWAP1
  • [43] PUSH2 0x00e7
  • [44] JUMP
  • [45] JUMPDEST
  • [46] PUSH2 0x005d
  • [47] JUMP
  • [48] JUMPDEST
  • [49] PUSH1 0x40
  • [50] MLOAD
  • [51] PUSH2 0x0054
  • [52] SWAP2
  • [53] SWAP1
  • [54] PUSH2 0x016c
  • [55] JUMP
  • [56] JUMPDEST
  • [57] PUSH1 0x40
  • [58] MLOAD
  • [59] DUP1
  • [60] SWAP2
  • [61] SUB
  • [62] SWAP1
  • [63] RETURN
  • [64] JUMPDEST
  • [65] PUSH0 0x
  • [66] DUP3
  • [67] DUP3
  • [68] PUSH1 0x40
  • [69] MLOAD
  • [70] PUSH2 0x006e
  • [71] SWAP3
  • [72] SWAP2
  • [73] SWAP1
  • [74] PUSH2 0x01c1
  • [75] JUMP
  • [76] JUMPDEST
  • [77] PUSH1 0x40
  • [78] MLOAD
  • [79] DUP1
  • [80] SWAP2
  • [81] SUB
  • [82] SWAP1
  • [83] SHA3
  • [84] SWAP1
  • [85] POP
  • [86] SWAP3
  • [87] SWAP2
  • [88] POP
  • [89] POP
  • [90] JUMP
  • [91] JUMPDEST
  • [92] PUSH0 0x
  • [93] DUP1
  • [94] REVERT
  • [95] JUMPDEST
  • [96] PUSH0 0x
  • [97] DUP1
  • [98] REVERT
  • [99] JUMPDEST
  • [100] PUSH0 0x
  • [101] DUP1
  • [102] REVERT
  • [103] JUMPDEST
  • [104] PUSH0 0x
  • [105] DUP1
  • [106] REVERT
  • [107] JUMPDEST
  • [108] PUSH0 0x
  • [109] DUP1
  • [110] REVERT
  • [111] JUMPDEST
  • [112] PUSH0 0x
  • [113] DUP1
  • [114] DUP4
  • [115] PUSH1 0x1f
  • [116] DUP5
  • [117] ADD
  • [118] SLT
  • [119] PUSH2 0x00a7
  • [120] JUMPI
  • [121] PUSH2 0x00a6
  • [122] PUSH2 0x0086
  • [123] JUMP
  • [124] JUMPDEST
  • [125] JUMPDEST
  • [126] DUP3
  • [127] CALLDATALOAD
  • [128] SWAP1
  • [129] POP
  • [130] PUSH8 0xffffffffffffffff
  • [131] DUP2
  • [132] GT
  • [133] ISZERO
  • [134] PUSH2 0x00c4
  • [135] JUMPI
  • [136] PUSH2 0x00c3
  • [137] PUSH2 0x008a
  • [138] JUMP
  • [139] JUMPDEST
  • [140] JUMPDEST
  • [141] PUSH1 0x20
  • [142] DUP4
  • [143] ADD
  • [144] SWAP2
  • [145] POP
  • [146] DUP4
  • [147] PUSH1 0x01
  • [148] DUP3
  • [149] MUL
  • [150] DUP4
  • [151] ADD
  • [152] GT
  • [153] ISZERO
  • [154] PUSH2 0x00e0
  • [155] JUMPI
  • [156] PUSH2 0x00df
  • [157] PUSH2 0x008e
  • [158] JUMP
  • [159] JUMPDEST
  • [160] JUMPDEST
  • [161] SWAP3
  • [162] POP
  • [163] SWAP3
  • [164] SWAP1
  • [165] POP
  • [166] JUMP
  • [167] JUMPDEST
  • [168] PUSH0 0x
  • [169] DUP1
  • [170] PUSH1 0x20
  • [171] DUP4
  • [172] DUP6
  • [173] SUB
  • [174] SLT
  • [175] ISZERO
  • [176] PUSH2 0x00fd
  • [177] JUMPI
  • [178] PUSH2 0x00fc
  • [179] PUSH2 0x007e
  • [180] JUMP
  • [181] JUMPDEST
  • [182] JUMPDEST
  • [183] PUSH0 0x
  • [184] DUP4
  • [185] ADD
  • [186] CALLDATALOAD
  • [187] PUSH8 0xffffffffffffffff
  • [188] DUP2
  • [189] GT
  • [190] ISZERO
  • [191] PUSH2 0x011a
  • [192] JUMPI
  • [193] PUSH2 0x0119
  • [194] PUSH2 0x0082
  • [195] JUMP
  • [196] JUMPDEST
  • [197] JUMPDEST
  • [198] PUSH2 0x0126
  • [199] DUP6
  • [200] DUP3
  • [201] DUP7
  • [202] ADD
  • [203] PUSH2 0x0092
  • [204] JUMP
  • [205] JUMPDEST
  • [206] SWAP3
  • [207] POP
  • [208] SWAP3
  • [209] POP
  • [210] POP
  • [211] SWAP3
  • [212] POP
  • [213] SWAP3
  • [214] SWAP1
  • [215] POP
  • [216] JUMP
  • [217] JUMPDEST
  • [218] PUSH0 0x
  • [219] PUSH32 0xffffffff00000000000000000000000000000000000000000000000000000000
  • [220] DUP3
  • [221] AND
  • [222] SWAP1
  • [223] POP
  • [224] SWAP2
  • [225] SWAP1
  • [226] POP
  • [227] JUMP
  • [228] JUMPDEST
  • [229] PUSH2 0x0166
  • [230] DUP2
  • [231] PUSH2 0x0132
  • [232] JUMP
  • [233] JUMPDEST
  • [234] DUP3
  • [235] MSTORE
  • [236] POP
  • [237] POP
  • [238] JUMP
  • [239] JUMPDEST
  • [240] PUSH0 0x
  • [241] PUSH1 0x20
  • [242] DUP3
  • [243] ADD
  • [244] SWAP1
  • [245] POP
  • [246] PUSH2 0x017f
  • [247] PUSH0 0x
  • [248] DUP4
  • [249] ADD
  • [250] DUP5
  • [251] PUSH2 0x015d
  • [252] JUMP
  • [253] JUMPDEST
  • [254] SWAP3
  • [255] SWAP2
  • [256] POP
  • [257] POP
  • [258] JUMP
  • [259] JUMPDEST
  • [260] PUSH0 0x
  • [261] DUP2
  • [262] SWAP1
  • [263] POP
  • [264] SWAP3
  • [265] SWAP2
  • [266] POP
  • [267] POP
  • [268] JUMP
  • [269] JUMPDEST
  • [270] DUP3
  • [271] DUP2
  • [272] DUP4
  • [273] CALLDATACOPY
  • [274] PUSH0 0x
  • [275] DUP4
  • [276] DUP4
  • [277] ADD
  • [278] MSTORE
  • [279] POP
  • [280] POP
  • [281] POP
  • [282] JUMP
  • [283] JUMPDEST
  • [284] PUSH0 0x
  • [285] PUSH2 0x01a8
  • [286] DUP4
  • [287] DUP6
  • [288] PUSH2 0x0185
  • [289] JUMP
  • [290] JUMPDEST
  • [291] SWAP4
  • [292] POP
  • [293] PUSH2 0x01b5
  • [294] DUP4
  • [295] DUP6
  • [296] DUP5
  • [297] PUSH2 0x018f
  • [298] JUMP
  • [299] JUMPDEST
  • [300] DUP3
  • [301] DUP5
  • [302] ADD
  • [303] SWAP1
  • [304] POP
  • [305] SWAP4
  • [306] SWAP3
  • [307] POP
  • [308] POP
  • [309] POP
  • [310] JUMP
  • [311] JUMPDEST
  • [312] PUSH0 0x
  • [313] PUSH2 0x01cd
  • [314] DUP3
  • [315] DUP5
  • [316] DUP7
  • [317] PUSH2 0x019d
  • [318] JUMP
  • [319] JUMPDEST
  • [320] SWAP2
  • [321] POP
  • [322] DUP2
  • [323] SWAP1
  • [324] POP
  • [325] SWAP4
  • [326] SWAP3
  • [327] POP
  • [328] POP
  • [329] POP
  • [330] JUMP
  • [331] 'fe'(Unknown Opcode)
  • [332] LOG2
  • [333] PUSH5 0x6970667358
  • [334] '22'(Unknown Opcode)
  • [335] SLT
  • [336] SHA3
  • [337] PUSH17 0xedeb5848336211f9fc6c4785fc371da273
  • [338] XOR
  • [339] '4d'(Unknown Opcode)
  • [340] JUMP
  • [341] GASPRICE
  • [342] 'e3'(Unknown Opcode)
  • [343] PUSH19 0x571c6c8e61ce228a64736f6c634300081a0033