Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x003f
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x3fb5c1cb
  • [24] EQ
  • [25] PUSH2 0x0043
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0x8381f58a
  • [29] EQ
  • [30] PUSH2 0x005f
  • [31] JUMPI
  • [32] DUP1
  • [33] PUSH4 0xd09de08a
  • [34] EQ
  • [35] PUSH2 0x007d
  • [36] JUMPI
  • [37] JUMPDEST
  • [38] PUSH0 0x
  • [39] DUP1
  • [40] REVERT
  • [41] JUMPDEST
  • [42] PUSH2 0x005d
  • [43] PUSH1 0x04
  • [44] DUP1
  • [45] CALLDATASIZE
  • [46] SUB
  • [47] DUP2
  • [48] ADD
  • [49] SWAP1
  • [50] PUSH2 0x0058
  • [51] SWAP2
  • [52] SWAP1
  • [53] PUSH2 0x00e4
  • [54] JUMP
  • [55] JUMPDEST
  • [56] PUSH2 0x0087
  • [57] JUMP
  • [58] JUMPDEST
  • [59] STOP
  • [60] JUMPDEST
  • [61] PUSH2 0x0067
  • [62] PUSH2 0x0090
  • [63] JUMP
  • [64] JUMPDEST
  • [65] PUSH1 0x40
  • [66] MLOAD
  • [67] PUSH2 0x0074
  • [68] SWAP2
  • [69] SWAP1
  • [70] PUSH2 0x011e
  • [71] JUMP
  • [72] JUMPDEST
  • [73] PUSH1 0x40
  • [74] MLOAD
  • [75] DUP1
  • [76] SWAP2
  • [77] SUB
  • [78] SWAP1
  • [79] RETURN
  • [80] JUMPDEST
  • [81] PUSH2 0x0085
  • [82] PUSH2 0x0095
  • [83] JUMP
  • [84] JUMPDEST
  • [85] STOP
  • [86] JUMPDEST
  • [87] DUP1
  • [88] PUSH0 0x
  • [89] DUP2
  • [90] SWAP1
  • [91] SSTORE
  • [92] POP
  • [93] POP
  • [94] JUMP
  • [95] JUMPDEST
  • [96] PUSH0 0x
  • [97] SLOAD
  • [98] DUP2
  • [99] JUMP
  • [100] JUMPDEST
  • [101] PUSH0 0x
  • [102] DUP1
  • [103] DUP2
  • [104] SLOAD
  • [105] DUP1
  • [106] SWAP3
  • [107] SWAP2
  • [108] SWAP1
  • [109] PUSH2 0x00a6
  • [110] SWAP1
  • [111] PUSH2 0x0164
  • [112] JUMP
  • [113] JUMPDEST
  • [114] SWAP2
  • [115] SWAP1
  • [116] POP
  • [117] SSTORE
  • [118] POP
  • [119] JUMP
  • [120] JUMPDEST
  • [121] PUSH0 0x
  • [122] DUP1
  • [123] REVERT
  • [124] JUMPDEST
  • [125] PUSH0 0x
  • [126] DUP2
  • [127] SWAP1
  • [128] POP
  • [129] SWAP2
  • [130] SWAP1
  • [131] POP
  • [132] JUMP
  • [133] JUMPDEST
  • [134] PUSH2 0x00c3
  • [135] DUP2
  • [136] PUSH2 0x00b1
  • [137] JUMP
  • [138] JUMPDEST
  • [139] DUP2
  • [140] EQ
  • [141] PUSH2 0x00cd
  • [142] JUMPI
  • [143] PUSH0 0x
  • [144] DUP1
  • [145] REVERT
  • [146] JUMPDEST
  • [147] POP
  • [148] JUMP
  • [149] JUMPDEST
  • [150] PUSH0 0x
  • [151] DUP2
  • [152] CALLDATALOAD
  • [153] SWAP1
  • [154] POP
  • [155] PUSH2 0x00de
  • [156] DUP2
  • [157] PUSH2 0x00ba
  • [158] JUMP
  • [159] JUMPDEST
  • [160] SWAP3
  • [161] SWAP2
  • [162] POP
  • [163] POP
  • [164] JUMP
  • [165] JUMPDEST
  • [166] PUSH0 0x
  • [167] PUSH1 0x20
  • [168] DUP3
  • [169] DUP5
  • [170] SUB
  • [171] SLT
  • [172] ISZERO
  • [173] PUSH2 0x00f9
  • [174] JUMPI
  • [175] PUSH2 0x00f8
  • [176] PUSH2 0x00ad
  • [177] JUMP
  • [178] JUMPDEST
  • [179] JUMPDEST
  • [180] PUSH0 0x
  • [181] PUSH2 0x0106
  • [182] DUP5
  • [183] DUP3
  • [184] DUP6
  • [185] ADD
  • [186] PUSH2 0x00d0
  • [187] JUMP
  • [188] JUMPDEST
  • [189] SWAP2
  • [190] POP
  • [191] POP
  • [192] SWAP3
  • [193] SWAP2
  • [194] POP
  • [195] POP
  • [196] JUMP
  • [197] JUMPDEST
  • [198] PUSH2 0x0118
  • [199] DUP2
  • [200] PUSH2 0x00b1
  • [201] JUMP
  • [202] JUMPDEST
  • [203] DUP3
  • [204] MSTORE
  • [205] POP
  • [206] POP
  • [207] JUMP
  • [208] JUMPDEST
  • [209] PUSH0 0x
  • [210] PUSH1 0x20
  • [211] DUP3
  • [212] ADD
  • [213] SWAP1
  • [214] POP
  • [215] PUSH2 0x0131
  • [216] PUSH0 0x
  • [217] DUP4
  • [218] ADD
  • [219] DUP5
  • [220] PUSH2 0x010f
  • [221] JUMP
  • [222] JUMPDEST
  • [223] SWAP3
  • [224] SWAP2
  • [225] POP
  • [226] POP
  • [227] JUMP
  • [228] JUMPDEST
  • [229] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
  • [230] PUSH0 0x
  • [231] MSTORE
  • [232] PUSH1 0x11
  • [233] PUSH1 0x04
  • [234] MSTORE
  • [235] PUSH1 0x24
  • [236] PUSH0 0x
  • [237] REVERT
  • [238] JUMPDEST
  • [239] PUSH0 0x
  • [240] PUSH2 0x016e
  • [241] DUP3
  • [242] PUSH2 0x00b1
  • [243] JUMP
  • [244] JUMPDEST
  • [245] SWAP2
  • [246] POP
  • [247] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
  • [248] DUP3
  • [249] SUB
  • [250] PUSH2 0x01a0
  • [251] JUMPI
  • [252] PUSH2 0x019f
  • [253] PUSH2 0x0137
  • [254] JUMP
  • [255] JUMPDEST
  • [256] JUMPDEST
  • [257] PUSH1 0x01
  • [258] DUP3
  • [259] ADD
  • [260] SWAP1
  • [261] POP
  • [262] SWAP2
  • [263] SWAP1
  • [264] POP
  • [265] JUMP
  • [266] 'fe'(Unknown Opcode)
  • [267] LOG2
  • [268] PUSH5 0x6970667358
  • [269] '22'(Unknown Opcode)
  • [270] SLT
  • [271] SHA3
  • [272] CODESIZE
  • [273] PUSH27 0xb642a48c6ea0eb7a22e2af9335c91f7fb2fa725938bb366f8dd6c0
  • [274] SWAP10
  • [275] 'dd'(Unknown Opcode)
  • [276] 'c0'(Unknown Opcode)
  • [277] PUSH5 0x736f6c6343
  • [278] STOP
  • [279] ADDMOD
  • [280] BYTE
  • [281] STOP
  • [282] CALLER