Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x04
  • [4] CALLDATASIZE
  • [5] LT
  • [6] ISZERO
  • [7] PUSH1 0x15
  • [8] JUMPI
  • [9] JUMPDEST
  • [10] CALLDATASIZE
  • [11] PUSH1 0x90
  • [12] JUMPI
  • [13] PUSH1 0x90
  • [14] JUMP
  • [15] JUMPDEST
  • [16] PUSH1 0x00
  • [17] DUP1
  • [18] CALLDATALOAD
  • [19] PUSH1 0xe0
  • [20] SHR
  • [21] PUSH4 0x75d0c0dc
  • [22] EQ
  • [23] PUSH1 0x2a
  • [24] JUMPI
  • [25] POP
  • [26] PUSH1 0x0d
  • [27] JUMP
  • [28] JUMPDEST
  • [29] CALLVALUE
  • [30] PUSH1 0x8d
  • [31] JUMPI
  • [32] DUP1
  • [33] PUSH1 0x03
  • [34] NOT
  • [35] CALLDATASIZE
  • [36] ADD
  • [37] SLT
  • [38] PUSH1 0x8d
  • [39] JUMPI
  • [40] PUSH1 0xc0
  • [41] PUSH1 0x40
  • [42] MSTORE
  • [43] PUSH1 0x10
  • [44] DUP1
  • [45] PUSH1 0x80
  • [46] MSTORE
  • [47] PUSH1 0xa0
  • [48] SWAP1
  • [49] PUSH16 0x467265656520313135352050726f7879
  • [50] PUSH1 0x80
  • [51] SHL
  • [52] PUSH1 0xa0
  • [53] MSTORE
  • [54] PUSH1 0x20
  • [55] SWAP2
  • [56] PUSH1 0x20
  • [57] PUSH1 0xc0
  • [58] MSTORE
  • [59] PUSH1 0x10
  • [60] PUSH1 0xe0
  • [61] MSTORE
  • [62] DUP4
  • [63] JUMPDEST
  • [64] DUP3
  • [65] DUP2
  • [66] LT
  • [67] PUSH1 0x7d
  • [68] JUMPI
  • [69] DUP5
  • [70] PUSH2 0x0110
  • [71] MSTORE
  • [72] PUSH1 0x60
  • [73] PUSH1 0xc0
  • [74] RETURN
  • [75] JUMPDEST
  • [76] DUP2
  • [77] DUP2
  • [78] ADD
  • [79] MLOAD
  • [80] PUSH2 0x0100
  • [81] DUP3
  • [82] ADD
  • [83] MSTORE
  • [84] DUP4
  • [85] ADD
  • [86] PUSH1 0x6c
  • [87] JUMP
  • [88] JUMPDEST
  • [89] DUP1
  • [90] REVERT
  • [91] JUMPDEST
  • [92] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
  • [93] SLOAD
  • [94] PUSH1 0x00
  • [95] SWAP1
  • [96] DUP2
  • [97] SWAP1
  • [98] DUP2
  • [99] SWAP1
  • [100] PUSH1 0x01
  • [101] PUSH1 0x01
  • [102] PUSH1 0xa0
  • [103] SHL
  • [104] SUB
  • [105] AND
  • [106] CALLDATASIZE
  • [107] DUP3
  • [108] DUP1
  • [109] CALLDATACOPY
  • [110] DUP2
  • [111] CALLDATASIZE
  • [112] SWAP2
  • [113] GAS
  • [114] DELEGATECALL
  • [115] RETURNDATASIZE
  • [116] DUP3
  • [117] DUP1
  • [118] RETURNDATACOPY
  • [119] ISZERO
  • [120] PUSH1 0xd7
  • [121] JUMPI
  • [122] RETURNDATASIZE
  • [123] SWAP1
  • [124] RETURN
  • [125] JUMPDEST
  • [126] RETURNDATASIZE
  • [127] SWAP1
  • [128] REVERT
  • [129] 'fe'(Unknown Opcode)
  • [130] LOG2
  • [131] PUSH5 0x6970667358
  • [132] '22'(Unknown Opcode)
  • [133] SLT
  • [134] SHA3
  • [135] 'b9'(Unknown Opcode)
  • [136] PUSH30 0x4626556c8033ea88530d5c895e3ca12991a4e8452f5c7a2a986f9343538d
  • [137] PUSH5 0x736f6c6343
  • [138] STOP
  • [139] ADDMOD
  • [140] NOT
  • [141] STOP
  • [142] CALLER