Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x04
  • [4] CALLDATASIZE
  • [5] LT
  • [6] PUSH2 0x0022
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] CALLDATALOAD
  • [10] PUSH1 0xe0
  • [11] SHR
  • [12] DUP1
  • [13] PUSH4 0x59659e90
  • [14] EQ
  • [15] PUSH2 0x0039
  • [16] JUMPI
  • [17] PUSH2 0x0031
  • [18] JUMP
  • [19] JUMPDEST
  • [20] CALLDATASIZE
  • [21] PUSH2 0x0031
  • [22] JUMPI
  • [23] PUSH2 0x002f
  • [24] PUSH2 0x006a
  • [25] JUMP
  • [26] JUMPDEST
  • [27] STOP
  • [28] JUMPDEST
  • [29] PUSH2 0x002f
  • [30] PUSH2 0x006a
  • [31] JUMP
  • [32] JUMPDEST
  • [33] CALLVALUE
  • [34] DUP1
  • [35] ISZERO
  • [36] PUSH2 0x0045
  • [37] JUMPI
  • [38] PUSH1 0x00
  • [39] DUP1
  • [40] REVERT
  • [41] JUMPDEST
  • [42] POP
  • [43] PUSH2 0x004e
  • [44] PUSH2 0x007c
  • [45] JUMP
  • [46] JUMPDEST
  • [47] PUSH1 0x40
  • [48] MLOAD
  • [49] PUSH1 0x01
  • [50] PUSH1 0x01
  • [51] PUSH1 0xa0
  • [52] SHL
  • [53] SUB
  • [54] SWAP1
  • [55] SWAP2
  • [56] AND
  • [57] DUP2
  • [58] MSTORE
  • [59] PUSH1 0x20
  • [60] ADD
  • [61] PUSH1 0x40
  • [62] MLOAD
  • [63] DUP1
  • [64] SWAP2
  • [65] SUB
  • [66] SWAP1
  • [67] RETURN
  • [68] JUMPDEST
  • [69] PUSH2 0x007a
  • [70] PUSH2 0x0075
  • [71] PUSH2 0x008b
  • [72] JUMP
  • [73] JUMPDEST
  • [74] PUSH2 0x00f6
  • [75] JUMP
  • [76] JUMPDEST
  • [77] JUMP
  • [78] JUMPDEST
  • [79] PUSH1 0x00
  • [80] PUSH2 0x0086
  • [81] PUSH2 0x011a
  • [82] JUMP
  • [83] JUMPDEST
  • [84] SWAP1
  • [85] POP
  • [86] SWAP1
  • [87] JUMP
  • [88] JUMPDEST
  • [89] PUSH1 0x00
  • [90] PUSH2 0x0095
  • [91] PUSH2 0x011a
  • [92] JUMP
  • [93] JUMPDEST
  • [94] PUSH1 0x01
  • [95] PUSH1 0x01
  • [96] PUSH1 0xa0
  • [97] SHL
  • [98] SUB
  • [99] AND
  • [100] PUSH4 0x5c60da1b
  • [101] PUSH1 0x40
  • [102] MLOAD
  • [103] DUP2
  • [104] PUSH4 0xffffffff
  • [105] AND
  • [106] PUSH1 0xe0
  • [107] SHL
  • [108] DUP2
  • [109] MSTORE
  • [110] PUSH1 0x04
  • [111] ADD
  • [112] PUSH1 0x20
  • [113] PUSH1 0x40
  • [114] MLOAD
  • [115] DUP1
  • [116] DUP4
  • [117] SUB
  • [118] DUP2
  • [119] DUP7
  • [120] GAS
  • [121] STATICCALL
  • [122] ISZERO
  • [123] DUP1
  • [124] ISZERO
  • [125] PUSH2 0x00d2
  • [126] JUMPI
  • [127] RETURNDATASIZE
  • [128] PUSH1 0x00
  • [129] DUP1
  • [130] RETURNDATACOPY
  • [131] RETURNDATASIZE
  • [132] PUSH1 0x00
  • [133] REVERT
  • [134] JUMPDEST
  • [135] POP
  • [136] POP
  • [137] POP
  • [138] POP
  • [139] PUSH1 0x40
  • [140] MLOAD
  • [141] RETURNDATASIZE
  • [142] PUSH1 0x1f
  • [143] NOT
  • [144] PUSH1 0x1f
  • [145] DUP3
  • [146] ADD
  • [147] AND
  • [148] DUP3
  • [149] ADD
  • [150] DUP1
  • [151] PUSH1 0x40
  • [152] MSTORE
  • [153] POP
  • [154] DUP2
  • [155] ADD
  • [156] SWAP1
  • [157] PUSH2 0x0086
  • [158] SWAP2
  • [159] SWAP1
  • [160] PUSH2 0x013e
  • [161] JUMP
  • [162] JUMPDEST
  • [163] CALLDATASIZE
  • [164] PUSH1 0x00
  • [165] DUP1
  • [166] CALLDATACOPY
  • [167] PUSH1 0x00
  • [168] DUP1
  • [169] CALLDATASIZE
  • [170] PUSH1 0x00
  • [171] DUP5
  • [172] GAS
  • [173] DELEGATECALL
  • [174] RETURNDATASIZE
  • [175] PUSH1 0x00
  • [176] DUP1
  • [177] RETURNDATACOPY
  • [178] DUP1
  • [179] DUP1
  • [180] ISZERO
  • [181] PUSH2 0x0115
  • [182] JUMPI
  • [183] RETURNDATASIZE
  • [184] PUSH1 0x00
  • [185] RETURN
  • [186] JUMPDEST
  • [187] RETURNDATASIZE
  • [188] PUSH1 0x00
  • [189] REVERT
  • [190] JUMPDEST
  • [191] PUSH32 0x0000000000000000000000009191270aadce6786a13c0355bd32aa49339ad8c8
  • [192] SWAP1
  • [193] JUMP
  • [194] JUMPDEST
  • [195] PUSH1 0x00
  • [196] PUSH1 0x20
  • [197] DUP3
  • [198] DUP5
  • [199] SUB
  • [200] SLT
  • [201] ISZERO
  • [202] PUSH2 0x0150
  • [203] JUMPI
  • [204] PUSH1 0x00
  • [205] DUP1
  • [206] REVERT
  • [207] JUMPDEST
  • [208] DUP2
  • [209] MLOAD
  • [210] PUSH1 0x01
  • [211] PUSH1 0x01
  • [212] PUSH1 0xa0
  • [213] SHL
  • [214] SUB
  • [215] DUP2
  • [216] AND
  • [217] DUP2
  • [218] EQ
  • [219] PUSH2 0x0167
  • [220] JUMPI
  • [221] PUSH1 0x00
  • [222] DUP1
  • [223] REVERT
  • [224] JUMPDEST
  • [225] SWAP4
  • [226] SWAP3
  • [227] POP
  • [228] POP
  • [229] POP
  • [230] JUMP
  • [231] 'fe'(Unknown Opcode)
  • [232] LOG2
  • [233] PUSH5 0x6970667358
  • [234] '22'(Unknown Opcode)
  • [235] SLT
  • [236] SHA3
  • [237] '23'(Unknown Opcode)
  • [238] SWAP9
  • [239] CALLER
  • [240] ADDRESS
  • [241] SUB
  • [242] PUSH1 0xc7
  • [243] '0d'(Unknown Opcode)
  • [244] '4c'(Unknown Opcode)
  • [245] CHAINID
  • [246] CALLDATACOPY
  • [247] 'b8'(Unknown Opcode)
  • [248] STOP
  • [249] OR
  • [250] GASPRICE
  • [251] JUMPI
  • [252] 'ce'(Unknown Opcode)
  • [253] ISZERO
  • [254] SWAP6
  • [255] TSTORE
  • [256] SWAP5
  • [257] SWAP16
  • [258] BYTE
  • [259] '2a'(Unknown Opcode)
  • [260] CALLDATACOPY
  • [261] DUP13
  • [262] SLT
  • [263] MUL
  • [264] '0d'(Unknown Opcode)
  • [265] SHR
  • [266] EQ
  • [267] '0c'(Unknown Opcode)
  • [268] PUSH5 0x736f6c6343
  • [269] STOP
  • [270] ADDMOD
  • [271] BYTE
  • [272] STOP
  • [273] CALLER