Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] PUSH1 0x04
- [4] CALLDATASIZE
- [5] LT
- [6] PUSH2 0x003e
- [7] JUMPI
- [8] PUSH0 0x
- [9] CALLDATALOAD
- [10] PUSH1 0xe0
- [11] SHR
- [12] DUP1
- [13] PUSH4 0x71eb7838
- [14] EQ
- [15] PUSH2 0x0042
- [16] JUMPI
- [17] DUP1
- [18] PUSH4 0x8da5cb5b
- [19] EQ
- [20] PUSH2 0x0058
- [21] JUMPI
- [22] DUP1
- [23] PUSH4 0xd917deb5
- [24] EQ
- [25] PUSH2 0x0082
- [26] JUMPI
- [27] DUP1
- [28] PUSH4 0xe2982c21
- [29] EQ
- [30] PUSH2 0x008c
- [31] JUMPI
- [32] JUMPDEST
- [33] PUSH0 0x
- [34] DUP1
- [35] REVERT
- [36] JUMPDEST
- [37] CALLVALUE
- [38] DUP1
- [39] ISZERO
- [40] PUSH2 0x004d
- [41] JUMPI
- [42] PUSH0 0x
- [43] DUP1
- [44] REVERT
- [45] JUMPDEST
- [46] POP
- [47] PUSH2 0x0056
- [48] PUSH2 0x00c8
- [49] JUMP
- [50] JUMPDEST
- [51] STOP
- [52] JUMPDEST
- [53] CALLVALUE
- [54] DUP1
- [55] ISZERO
- [56] PUSH2 0x0063
- [57] JUMPI
- [58] PUSH0 0x
- [59] DUP1
- [60] REVERT
- [61] JUMPDEST
- [62] POP
- [63] PUSH2 0x006c
- [64] PUSH2 0x014f
- [65] JUMP
- [66] JUMPDEST
- [67] PUSH1 0x40
- [68] MLOAD
- [69] PUSH2 0x0079
- [70] SWAP2
- [71] SWAP1
- [72] PUSH2 0x020a
- [73] JUMP
- [74] JUMPDEST
- [75] PUSH1 0x40
- [76] MLOAD
- [77] DUP1
- [78] SWAP2
- [79] SUB
- [80] SWAP1
- [81] RETURN
- [82] JUMPDEST
- [83] PUSH2 0x008a
- [84] PUSH2 0x0172
- [85] JUMP
- [86] JUMPDEST
- [87] STOP
- [88] JUMPDEST
- [89] CALLVALUE
- [90] DUP1
- [91] ISZERO
- [92] PUSH2 0x0097
- [93] JUMPI
- [94] PUSH0 0x
- [95] DUP1
- [96] REVERT
- [97] JUMPDEST
- [98] POP
- [99] PUSH2 0x00b2
- [100] PUSH1 0x04
- [101] DUP1
- [102] CALLDATASIZE
- [103] SUB
- [104] DUP2
- [105] ADD
- [106] SWAP1
- [107] PUSH2 0x00ad
- [108] SWAP2
- [109] SWAP1
- [110] PUSH2 0x0251
- [111] JUMP
- [112] JUMPDEST
- [113] PUSH2 0x01b6
- [114] JUMP
- [115] JUMPDEST
- [116] PUSH1 0x40
- [117] MLOAD
- [118] PUSH2 0x00bf
- [119] SWAP2
- [120] SWAP1
- [121] PUSH2 0x0294
- [122] JUMP
- [123] JUMPDEST
- [124] PUSH1 0x40
- [125] MLOAD
- [126] DUP1
- [127] SWAP2
- [128] SUB
- [129] SWAP1
- [130] RETURN
- [131] JUMPDEST
- [132] PUSH0 0x
- [133] DUP1
- [134] PUSH0 0x
- [135] SWAP1
- [136] SLOAD
- [137] SWAP1
- [138] PUSH2 0x0100
- [139] EXP
- [140] SWAP1
- [141] DIV
- [142] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [143] AND
- [144] SWAP1
- [145] POP
- [146] PUSH0 0x
- [147] ADDRESS
- [148] SWAP1
- [149] POP
- [150] DUP2
- [151] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [152] AND
- [153] PUSH2 0x08fc
- [154] DUP3
- [155] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [156] AND
- [157] BALANCE
- [158] SWAP1
- [159] DUP2
- [160] ISZERO
- [161] MUL
- [162] SWAP1
- [163] PUSH1 0x40
- [164] MLOAD
- [165] PUSH0 0x
- [166] PUSH1 0x40
- [167] MLOAD
- [168] DUP1
- [169] DUP4
- [170] SUB
- [171] DUP2
- [172] DUP6
- [173] DUP9
- [174] DUP9
- [175] CALL
- [176] SWAP4
- [177] POP
- [178] POP
- [179] POP
- [180] POP
- [181] ISZERO
- [182] DUP1
- [183] ISZERO
- [184] PUSH2 0x014a
- [185] JUMPI
- [186] RETURNDATASIZE
- [187] PUSH0 0x
- [188] DUP1
- [189] RETURNDATACOPY
- [190] RETURNDATASIZE
- [191] PUSH0 0x
- [192] REVERT
- [193] JUMPDEST
- [194] POP
- [195] POP
- [196] POP
- [197] JUMP
- [198] JUMPDEST
- [199] PUSH0 0x
- [200] DUP1
- [201] SLOAD
- [202] SWAP1
- [203] PUSH2 0x0100
- [204] EXP
- [205] SWAP1
- [206] DIV
- [207] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [208] AND
- [209] DUP2
- [210] JUMP
- [211] JUMPDEST
- [212] CALLVALUE
- [213] PUSH1 0x01
- [214] PUSH0 0x
- [215] CALLER
- [216] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [217] AND
- [218] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [219] AND
- [220] DUP2
- [221] MSTORE
- [222] PUSH1 0x20
- [223] ADD
- [224] SWAP1
- [225] DUP2
- [226] MSTORE
- [227] PUSH1 0x20
- [228] ADD
- [229] PUSH0 0x
- [230] SHA3
- [231] DUP2
- [232] SWAP1
- [233] SSTORE
- [234] POP
- [235] JUMP
- [236] JUMPDEST
- [237] PUSH1 0x01
- [238] PUSH1 0x20
- [239] MSTORE
- [240] DUP1
- [241] PUSH0 0x
- [242] MSTORE
- [243] PUSH1 0x40
- [244] PUSH0 0x
- [245] SHA3
- [246] PUSH0 0x
- [247] SWAP2
- [248] POP
- [249] SWAP1
- [250] POP
- [251] SLOAD
- [252] DUP2
- [253] JUMP
- [254] JUMPDEST
- [255] PUSH0 0x
- [256] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [257] DUP3
- [258] AND
- [259] SWAP1
- [260] POP
- [261] SWAP2
- [262] SWAP1
- [263] POP
- [264] JUMP
- [265] JUMPDEST
- [266] PUSH0 0x
- [267] PUSH2 0x01f4
- [268] DUP3
- [269] PUSH2 0x01cb
- [270] JUMP
- [271] JUMPDEST
- [272] SWAP1
- [273] POP
- [274] SWAP2
- [275] SWAP1
- [276] POP
- [277] JUMP
- [278] JUMPDEST
- [279] PUSH2 0x0204
- [280] DUP2
- [281] PUSH2 0x01ea
- [282] JUMP
- [283] JUMPDEST
- [284] DUP3
- [285] MSTORE
- [286] POP
- [287] POP
- [288] JUMP
- [289] JUMPDEST
- [290] PUSH0 0x
- [291] PUSH1 0x20
- [292] DUP3
- [293] ADD
- [294] SWAP1
- [295] POP
- [296] PUSH2 0x021d
- [297] PUSH0 0x
- [298] DUP4
- [299] ADD
- [300] DUP5
- [301] PUSH2 0x01fb
- [302] JUMP
- [303] JUMPDEST
- [304] SWAP3
- [305] SWAP2
- [306] POP
- [307] POP
- [308] JUMP
- [309] JUMPDEST
- [310] PUSH0 0x
- [311] DUP1
- [312] REVERT
- [313] JUMPDEST
- [314] PUSH2 0x0230
- [315] DUP2
- [316] PUSH2 0x01ea
- [317] JUMP
- [318] JUMPDEST
- [319] DUP2
- [320] EQ
- [321] PUSH2 0x023a
- [322] JUMPI
- [323] PUSH0 0x
- [324] DUP1
- [325] REVERT
- [326] JUMPDEST
- [327] POP
- [328] JUMP
- [329] JUMPDEST
- [330] PUSH0 0x
- [331] DUP2
- [332] CALLDATALOAD
- [333] SWAP1
- [334] POP
- [335] PUSH2 0x024b
- [336] DUP2
- [337] PUSH2 0x0227
- [338] JUMP
- [339] JUMPDEST
- [340] SWAP3
- [341] SWAP2
- [342] POP
- [343] POP
- [344] JUMP
- [345] JUMPDEST
- [346] PUSH0 0x
- [347] PUSH1 0x20
- [348] DUP3
- [349] DUP5
- [350] SUB
- [351] SLT
- [352] ISZERO
- [353] PUSH2 0x0266
- [354] JUMPI
- [355] PUSH2 0x0265
- [356] PUSH2 0x0223
- [357] JUMP
- [358] JUMPDEST
- [359] JUMPDEST
- [360] PUSH0 0x
- [361] PUSH2 0x0273
- [362] DUP5
- [363] DUP3
- [364] DUP6
- [365] ADD
- [366] PUSH2 0x023d
- [367] JUMP
- [368] JUMPDEST
- [369] SWAP2
- [370] POP
- [371] POP
- [372] SWAP3
- [373] SWAP2
- [374] POP
- [375] POP
- [376] JUMP
- [377] JUMPDEST
- [378] PUSH0 0x
- [379] DUP2
- [380] SWAP1
- [381] POP
- [382] SWAP2
- [383] SWAP1
- [384] POP
- [385] JUMP
- [386] JUMPDEST
- [387] PUSH2 0x028e
- [388] DUP2
- [389] PUSH2 0x027c
- [390] JUMP
- [391] JUMPDEST
- [392] DUP3
- [393] MSTORE
- [394] POP
- [395] POP
- [396] JUMP
- [397] JUMPDEST
- [398] PUSH0 0x
- [399] PUSH1 0x20
- [400] DUP3
- [401] ADD
- [402] SWAP1
- [403] POP
- [404] PUSH2 0x02a7
- [405] PUSH0 0x
- [406] DUP4
- [407] ADD
- [408] DUP5
- [409] PUSH2 0x0285
- [410] JUMP
- [411] JUMPDEST
- [412] SWAP3
- [413] SWAP2
- [414] POP
- [415] POP
- [416] JUMP
- [417] 'fe'(Unknown Opcode)
- [418] LOG2
- [419] PUSH5 0x6970667358
- [420] '22'(Unknown Opcode)
- [421] SLT
- [422] SHA3
- [423] RETURN
- [424] 'a8'(Unknown Opcode)
- [425] MSIZE
- [426] '2a'(Unknown Opcode)
- [427] '21'(Unknown Opcode)
- [428] TIMESTAMP
- [429] '0d'(Unknown Opcode)
- [430] 'b3'(Unknown Opcode)
- [431] EXTCODESIZE
- [432] 'b6'(Unknown Opcode)
- [433] 'b6'(Unknown Opcode)
- [434] 'e1'(Unknown Opcode)
- [435] 'd4'(Unknown Opcode)
- [436] 'd5'(Unknown Opcode)
- [437] PUSH27 0x7fec028ad664dcf4078bf36f0472e74b5e64736f6c634300081a00
- [438] CALLER