Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
  • [4] SLOAD
  • [5] PUSH0 0x
  • [6] SWAP1
  • [7] DUP2
  • [8] SWAP1
  • [9] PUSH1 0x01
  • [10] PUSH1 0x01
  • [11] PUSH1 0xa0
  • [12] SHL
  • [13] SUB
  • [14] AND
  • [15] CALLDATASIZE
  • [16] DUP3
  • [17] DUP1
  • [18] CALLDATACOPY
  • [19] DUP2
  • [20] CALLDATASIZE
  • [21] SWAP2
  • [22] GAS
  • [23] DELEGATECALL
  • [24] RETURNDATASIZE
  • [25] PUSH0 0x
  • [26] DUP1
  • [27] RETURNDATACOPY
  • [28] ISZERO
  • [29] PUSH1 0x48
  • [30] JUMPI
  • [31] RETURNDATASIZE
  • [32] PUSH0 0x
  • [33] RETURN
  • [34] JUMPDEST
  • [35] RETURNDATASIZE
  • [36] PUSH0 0x
  • [37] REVERT
  • [38] 'fe'(Unknown Opcode)
  • [39] LOG1
  • [40] PUSH5 0x736f6c6343
  • [41] STOP
  • [42] ADDMOD
  • [43] BYTE
  • [44] STOP
  • [45] EXP