Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x04
  • [4] CALLDATASIZE
  • [5] LT
  • [6] PUSH2 0x003e
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] CALLDATALOAD
  • [10] PUSH1 0xe0
  • [11] SHR
  • [12] DUP1
  • [13] PUSH4 0x71eb7838
  • [14] EQ
  • [15] PUSH2 0x0042
  • [16] JUMPI
  • [17] DUP1
  • [18] PUSH4 0x8da5cb5b
  • [19] EQ
  • [20] PUSH2 0x0058
  • [21] JUMPI
  • [22] DUP1
  • [23] PUSH4 0xd917deb5
  • [24] EQ
  • [25] PUSH2 0x0082
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0xe2982c21
  • [29] EQ
  • [30] PUSH2 0x008c
  • [31] JUMPI
  • [32] JUMPDEST
  • [33] PUSH0 0x
  • [34] DUP1
  • [35] REVERT
  • [36] JUMPDEST
  • [37] CALLVALUE
  • [38] DUP1
  • [39] ISZERO
  • [40] PUSH2 0x004d
  • [41] JUMPI
  • [42] PUSH0 0x
  • [43] DUP1
  • [44] REVERT
  • [45] JUMPDEST
  • [46] POP
  • [47] PUSH2 0x0056
  • [48] PUSH2 0x00c8
  • [49] JUMP
  • [50] JUMPDEST
  • [51] STOP
  • [52] JUMPDEST
  • [53] CALLVALUE
  • [54] DUP1
  • [55] ISZERO
  • [56] PUSH2 0x0063
  • [57] JUMPI
  • [58] PUSH0 0x
  • [59] DUP1
  • [60] REVERT
  • [61] JUMPDEST
  • [62] POP
  • [63] PUSH2 0x006c
  • [64] PUSH2 0x014f
  • [65] JUMP
  • [66] JUMPDEST
  • [67] PUSH1 0x40
  • [68] MLOAD
  • [69] PUSH2 0x0079
  • [70] SWAP2
  • [71] SWAP1
  • [72] PUSH2 0x020a
  • [73] JUMP
  • [74] JUMPDEST
  • [75] PUSH1 0x40
  • [76] MLOAD
  • [77] DUP1
  • [78] SWAP2
  • [79] SUB
  • [80] SWAP1
  • [81] RETURN
  • [82] JUMPDEST
  • [83] PUSH2 0x008a
  • [84] PUSH2 0x0172
  • [85] JUMP
  • [86] JUMPDEST
  • [87] STOP
  • [88] JUMPDEST
  • [89] CALLVALUE
  • [90] DUP1
  • [91] ISZERO
  • [92] PUSH2 0x0097
  • [93] JUMPI
  • [94] PUSH0 0x
  • [95] DUP1
  • [96] REVERT
  • [97] JUMPDEST
  • [98] POP
  • [99] PUSH2 0x00b2
  • [100] PUSH1 0x04
  • [101] DUP1
  • [102] CALLDATASIZE
  • [103] SUB
  • [104] DUP2
  • [105] ADD
  • [106] SWAP1
  • [107] PUSH2 0x00ad
  • [108] SWAP2
  • [109] SWAP1
  • [110] PUSH2 0x0251
  • [111] JUMP
  • [112] JUMPDEST
  • [113] PUSH2 0x01b6
  • [114] JUMP
  • [115] JUMPDEST
  • [116] PUSH1 0x40
  • [117] MLOAD
  • [118] PUSH2 0x00bf
  • [119] SWAP2
  • [120] SWAP1
  • [121] PUSH2 0x0294
  • [122] JUMP
  • [123] JUMPDEST
  • [124] PUSH1 0x40
  • [125] MLOAD
  • [126] DUP1
  • [127] SWAP2
  • [128] SUB
  • [129] SWAP1
  • [130] RETURN
  • [131] JUMPDEST
  • [132] PUSH0 0x
  • [133] DUP1
  • [134] PUSH0 0x
  • [135] SWAP1
  • [136] SLOAD
  • [137] SWAP1
  • [138] PUSH2 0x0100
  • [139] EXP
  • [140] SWAP1
  • [141] DIV
  • [142] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [143] AND
  • [144] SWAP1
  • [145] POP
  • [146] PUSH0 0x
  • [147] ADDRESS
  • [148] SWAP1
  • [149] POP
  • [150] DUP2
  • [151] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [152] AND
  • [153] PUSH2 0x08fc
  • [154] DUP3
  • [155] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [156] AND
  • [157] BALANCE
  • [158] SWAP1
  • [159] DUP2
  • [160] ISZERO
  • [161] MUL
  • [162] SWAP1
  • [163] PUSH1 0x40
  • [164] MLOAD
  • [165] PUSH0 0x
  • [166] PUSH1 0x40
  • [167] MLOAD
  • [168] DUP1
  • [169] DUP4
  • [170] SUB
  • [171] DUP2
  • [172] DUP6
  • [173] DUP9
  • [174] DUP9
  • [175] CALL
  • [176] SWAP4
  • [177] POP
  • [178] POP
  • [179] POP
  • [180] POP
  • [181] ISZERO
  • [182] DUP1
  • [183] ISZERO
  • [184] PUSH2 0x014a
  • [185] JUMPI
  • [186] RETURNDATASIZE
  • [187] PUSH0 0x
  • [188] DUP1
  • [189] RETURNDATACOPY
  • [190] RETURNDATASIZE
  • [191] PUSH0 0x
  • [192] REVERT
  • [193] JUMPDEST
  • [194] POP
  • [195] POP
  • [196] POP
  • [197] JUMP
  • [198] JUMPDEST
  • [199] PUSH0 0x
  • [200] DUP1
  • [201] SLOAD
  • [202] SWAP1
  • [203] PUSH2 0x0100
  • [204] EXP
  • [205] SWAP1
  • [206] DIV
  • [207] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [208] AND
  • [209] DUP2
  • [210] JUMP
  • [211] JUMPDEST
  • [212] CALLVALUE
  • [213] PUSH1 0x01
  • [214] PUSH0 0x
  • [215] CALLER
  • [216] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [217] AND
  • [218] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [219] AND
  • [220] DUP2
  • [221] MSTORE
  • [222] PUSH1 0x20
  • [223] ADD
  • [224] SWAP1
  • [225] DUP2
  • [226] MSTORE
  • [227] PUSH1 0x20
  • [228] ADD
  • [229] PUSH0 0x
  • [230] SHA3
  • [231] DUP2
  • [232] SWAP1
  • [233] SSTORE
  • [234] POP
  • [235] JUMP
  • [236] JUMPDEST
  • [237] PUSH1 0x01
  • [238] PUSH1 0x20
  • [239] MSTORE
  • [240] DUP1
  • [241] PUSH0 0x
  • [242] MSTORE
  • [243] PUSH1 0x40
  • [244] PUSH0 0x
  • [245] SHA3
  • [246] PUSH0 0x
  • [247] SWAP2
  • [248] POP
  • [249] SWAP1
  • [250] POP
  • [251] SLOAD
  • [252] DUP2
  • [253] JUMP
  • [254] JUMPDEST
  • [255] PUSH0 0x
  • [256] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [257] DUP3
  • [258] AND
  • [259] SWAP1
  • [260] POP
  • [261] SWAP2
  • [262] SWAP1
  • [263] POP
  • [264] JUMP
  • [265] JUMPDEST
  • [266] PUSH0 0x
  • [267] PUSH2 0x01f4
  • [268] DUP3
  • [269] PUSH2 0x01cb
  • [270] JUMP
  • [271] JUMPDEST
  • [272] SWAP1
  • [273] POP
  • [274] SWAP2
  • [275] SWAP1
  • [276] POP
  • [277] JUMP
  • [278] JUMPDEST
  • [279] PUSH2 0x0204
  • [280] DUP2
  • [281] PUSH2 0x01ea
  • [282] JUMP
  • [283] JUMPDEST
  • [284] DUP3
  • [285] MSTORE
  • [286] POP
  • [287] POP
  • [288] JUMP
  • [289] JUMPDEST
  • [290] PUSH0 0x
  • [291] PUSH1 0x20
  • [292] DUP3
  • [293] ADD
  • [294] SWAP1
  • [295] POP
  • [296] PUSH2 0x021d
  • [297] PUSH0 0x
  • [298] DUP4
  • [299] ADD
  • [300] DUP5
  • [301] PUSH2 0x01fb
  • [302] JUMP
  • [303] JUMPDEST
  • [304] SWAP3
  • [305] SWAP2
  • [306] POP
  • [307] POP
  • [308] JUMP
  • [309] JUMPDEST
  • [310] PUSH0 0x
  • [311] DUP1
  • [312] REVERT
  • [313] JUMPDEST
  • [314] PUSH2 0x0230
  • [315] DUP2
  • [316] PUSH2 0x01ea
  • [317] JUMP
  • [318] JUMPDEST
  • [319] DUP2
  • [320] EQ
  • [321] PUSH2 0x023a
  • [322] JUMPI
  • [323] PUSH0 0x
  • [324] DUP1
  • [325] REVERT
  • [326] JUMPDEST
  • [327] POP
  • [328] JUMP
  • [329] JUMPDEST
  • [330] PUSH0 0x
  • [331] DUP2
  • [332] CALLDATALOAD
  • [333] SWAP1
  • [334] POP
  • [335] PUSH2 0x024b
  • [336] DUP2
  • [337] PUSH2 0x0227
  • [338] JUMP
  • [339] JUMPDEST
  • [340] SWAP3
  • [341] SWAP2
  • [342] POP
  • [343] POP
  • [344] JUMP
  • [345] JUMPDEST
  • [346] PUSH0 0x
  • [347] PUSH1 0x20
  • [348] DUP3
  • [349] DUP5
  • [350] SUB
  • [351] SLT
  • [352] ISZERO
  • [353] PUSH2 0x0266
  • [354] JUMPI
  • [355] PUSH2 0x0265
  • [356] PUSH2 0x0223
  • [357] JUMP
  • [358] JUMPDEST
  • [359] JUMPDEST
  • [360] PUSH0 0x
  • [361] PUSH2 0x0273
  • [362] DUP5
  • [363] DUP3
  • [364] DUP6
  • [365] ADD
  • [366] PUSH2 0x023d
  • [367] JUMP
  • [368] JUMPDEST
  • [369] SWAP2
  • [370] POP
  • [371] POP
  • [372] SWAP3
  • [373] SWAP2
  • [374] POP
  • [375] POP
  • [376] JUMP
  • [377] JUMPDEST
  • [378] PUSH0 0x
  • [379] DUP2
  • [380] SWAP1
  • [381] POP
  • [382] SWAP2
  • [383] SWAP1
  • [384] POP
  • [385] JUMP
  • [386] JUMPDEST
  • [387] PUSH2 0x028e
  • [388] DUP2
  • [389] PUSH2 0x027c
  • [390] JUMP
  • [391] JUMPDEST
  • [392] DUP3
  • [393] MSTORE
  • [394] POP
  • [395] POP
  • [396] JUMP
  • [397] JUMPDEST
  • [398] PUSH0 0x
  • [399] PUSH1 0x20
  • [400] DUP3
  • [401] ADD
  • [402] SWAP1
  • [403] POP
  • [404] PUSH2 0x02a7
  • [405] PUSH0 0x
  • [406] DUP4
  • [407] ADD
  • [408] DUP5
  • [409] PUSH2 0x0285
  • [410] JUMP
  • [411] JUMPDEST
  • [412] SWAP3
  • [413] SWAP2
  • [414] POP
  • [415] POP
  • [416] JUMP
  • [417] 'fe'(Unknown Opcode)
  • [418] LOG2
  • [419] PUSH5 0x6970667358
  • [420] '22'(Unknown Opcode)
  • [421] SLT
  • [422] SHA3
  • [423] RETURN
  • [424] 'a8'(Unknown Opcode)
  • [425] MSIZE
  • [426] '2a'(Unknown Opcode)
  • [427] '21'(Unknown Opcode)
  • [428] TIMESTAMP
  • [429] '0d'(Unknown Opcode)
  • [430] 'b3'(Unknown Opcode)
  • [431] EXTCODESIZE
  • [432] 'b6'(Unknown Opcode)
  • [433] 'b6'(Unknown Opcode)
  • [434] 'e1'(Unknown Opcode)
  • [435] 'd4'(Unknown Opcode)
  • [436] 'd5'(Unknown Opcode)
  • [437] PUSH27 0x7fec028ad664dcf4078bf36f0472e74b5e64736f6c634300081a00
  • [438] CALLER