Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x003f
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x2a1afcd9
  • [24] EQ
  • [25] PUSH2 0x0043
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0x60fe47b1
  • [29] EQ
  • [30] PUSH2 0x0061
  • [31] JUMPI
  • [32] DUP1
  • [33] PUSH4 0x6d4ce63c
  • [34] EQ
  • [35] PUSH2 0x007d
  • [36] JUMPI
  • [37] JUMPDEST
  • [38] PUSH0 0x
  • [39] DUP1
  • [40] REVERT
  • [41] JUMPDEST
  • [42] PUSH2 0x004b
  • [43] PUSH2 0x009b
  • [44] JUMP
  • [45] JUMPDEST
  • [46] PUSH1 0x40
  • [47] MLOAD
  • [48] PUSH2 0x0058
  • [49] SWAP2
  • [50] SWAP1
  • [51] PUSH2 0x00c9
  • [52] JUMP
  • [53] JUMPDEST
  • [54] PUSH1 0x40
  • [55] MLOAD
  • [56] DUP1
  • [57] SWAP2
  • [58] SUB
  • [59] SWAP1
  • [60] RETURN
  • [61] JUMPDEST
  • [62] PUSH2 0x007b
  • [63] PUSH1 0x04
  • [64] DUP1
  • [65] CALLDATASIZE
  • [66] SUB
  • [67] DUP2
  • [68] ADD
  • [69] SWAP1
  • [70] PUSH2 0x0076
  • [71] SWAP2
  • [72] SWAP1
  • [73] PUSH2 0x0110
  • [74] JUMP
  • [75] JUMPDEST
  • [76] PUSH2 0x00a0
  • [77] JUMP
  • [78] JUMPDEST
  • [79] STOP
  • [80] JUMPDEST
  • [81] PUSH2 0x0085
  • [82] PUSH2 0x00a9
  • [83] JUMP
  • [84] JUMPDEST
  • [85] PUSH1 0x40
  • [86] MLOAD
  • [87] PUSH2 0x0092
  • [88] SWAP2
  • [89] SWAP1
  • [90] PUSH2 0x00c9
  • [91] JUMP
  • [92] JUMPDEST
  • [93] PUSH1 0x40
  • [94] MLOAD
  • [95] DUP1
  • [96] SWAP2
  • [97] SUB
  • [98] SWAP1
  • [99] RETURN
  • [100] JUMPDEST
  • [101] PUSH0 0x
  • [102] SLOAD
  • [103] DUP2
  • [104] JUMP
  • [105] JUMPDEST
  • [106] DUP1
  • [107] PUSH0 0x
  • [108] DUP2
  • [109] SWAP1
  • [110] SSTORE
  • [111] POP
  • [112] POP
  • [113] JUMP
  • [114] JUMPDEST
  • [115] PUSH0 0x
  • [116] DUP1
  • [117] SLOAD
  • [118] SWAP1
  • [119] POP
  • [120] SWAP1
  • [121] JUMP
  • [122] JUMPDEST
  • [123] PUSH0 0x
  • [124] DUP2
  • [125] SWAP1
  • [126] POP
  • [127] SWAP2
  • [128] SWAP1
  • [129] POP
  • [130] JUMP
  • [131] JUMPDEST
  • [132] PUSH2 0x00c3
  • [133] DUP2
  • [134] PUSH2 0x00b1
  • [135] JUMP
  • [136] JUMPDEST
  • [137] DUP3
  • [138] MSTORE
  • [139] POP
  • [140] POP
  • [141] JUMP
  • [142] JUMPDEST
  • [143] PUSH0 0x
  • [144] PUSH1 0x20
  • [145] DUP3
  • [146] ADD
  • [147] SWAP1
  • [148] POP
  • [149] PUSH2 0x00dc
  • [150] PUSH0 0x
  • [151] DUP4
  • [152] ADD
  • [153] DUP5
  • [154] PUSH2 0x00ba
  • [155] JUMP
  • [156] JUMPDEST
  • [157] SWAP3
  • [158] SWAP2
  • [159] POP
  • [160] POP
  • [161] JUMP
  • [162] JUMPDEST
  • [163] PUSH0 0x
  • [164] DUP1
  • [165] REVERT
  • [166] JUMPDEST
  • [167] PUSH2 0x00ef
  • [168] DUP2
  • [169] PUSH2 0x00b1
  • [170] JUMP
  • [171] JUMPDEST
  • [172] DUP2
  • [173] EQ
  • [174] PUSH2 0x00f9
  • [175] JUMPI
  • [176] PUSH0 0x
  • [177] DUP1
  • [178] REVERT
  • [179] JUMPDEST
  • [180] POP
  • [181] JUMP
  • [182] JUMPDEST
  • [183] PUSH0 0x
  • [184] DUP2
  • [185] CALLDATALOAD
  • [186] SWAP1
  • [187] POP
  • [188] PUSH2 0x010a
  • [189] DUP2
  • [190] PUSH2 0x00e6
  • [191] JUMP
  • [192] JUMPDEST
  • [193] SWAP3
  • [194] SWAP2
  • [195] POP
  • [196] POP
  • [197] JUMP
  • [198] JUMPDEST
  • [199] PUSH0 0x
  • [200] PUSH1 0x20
  • [201] DUP3
  • [202] DUP5
  • [203] SUB
  • [204] SLT
  • [205] ISZERO
  • [206] PUSH2 0x0125
  • [207] JUMPI
  • [208] PUSH2 0x0124
  • [209] PUSH2 0x00e2
  • [210] JUMP
  • [211] JUMPDEST
  • [212] JUMPDEST
  • [213] PUSH0 0x
  • [214] PUSH2 0x0132
  • [215] DUP5
  • [216] DUP3
  • [217] DUP6
  • [218] ADD
  • [219] PUSH2 0x00fc
  • [220] JUMP
  • [221] JUMPDEST
  • [222] SWAP2
  • [223] POP
  • [224] POP
  • [225] SWAP3
  • [226] SWAP2
  • [227] POP
  • [228] POP
  • [229] JUMP
  • [230] 'fe'(Unknown Opcode)
  • [231] LOG2
  • [232] PUSH5 0x6970667358
  • [233] '22'(Unknown Opcode)
  • [234] SLT
  • [235] SHA3
  • [236] 'b0'(Unknown Opcode)
  • [237] TLOAD
  • [238] PUSH5 0xf95e720ea0
  • [239] '2c'(Unknown Opcode)
  • [240] ADD
  • [241] PUSH10 0xfe21f08e2bd4f0942909
  • [242] '25'(Unknown Opcode)
  • [243] 'a8'(Unknown Opcode)
  • [244] '26'(Unknown Opcode)
  • [245] CREATE
  • [246] PUSH2 0xf712
  • [247] 'dc'(Unknown Opcode)
  • [248] 'b3'(Unknown Opcode)
  • [249] 'ed'(Unknown Opcode)
  • [250] 'd1'(Unknown Opcode)
  • [251] PUSH5 0x736f6c6343
  • [252] STOP
  • [253] ADDMOD
  • [254] BYTE
  • [255] STOP
  • [256] CALLER