Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLVALUE
- [4] DUP1
- [5] ISZERO
- [6] PUSH2 0x000f
- [7] JUMPI
- [8] PUSH0 0x
- [9] DUP1
- [10] REVERT
- [11] JUMPDEST
- [12] POP
- [13] PUSH1 0x04
- [14] CALLDATASIZE
- [15] LT
- [16] PUSH2 0x0064
- [17] JUMPI
- [18] PUSH0 0x
- [19] CALLDATALOAD
- [20] PUSH1 0xe0
- [21] SHR
- [22] DUP1
- [23] PUSH4 0x9168cd71
- [24] GT
- [25] PUSH2 0x004d
- [26] JUMPI
- [27] DUP1
- [28] PUSH4 0x9168cd71
- [29] EQ
- [30] PUSH2 0x0091
- [31] JUMPI
- [32] DUP1
- [33] PUSH4 0xc8dc9bc4
- [34] EQ
- [35] PUSH2 0x00a4
- [36] JUMPI
- [37] DUP1
- [38] PUSH4 0xf2fde38b
- [39] EQ
- [40] PUSH2 0x00ba
- [41] JUMPI
- [42] PUSH0 0x
- [43] DUP1
- [44] REVERT
- [45] JUMPDEST
- [46] DUP1
- [47] PUSH4 0x715018a6
- [48] EQ
- [49] PUSH2 0x0068
- [50] JUMPI
- [51] DUP1
- [52] PUSH4 0x8da5cb5b
- [53] EQ
- [54] PUSH2 0x0072
- [55] JUMPI
- [56] JUMPDEST
- [57] PUSH0 0x
- [58] DUP1
- [59] REVERT
- [60] JUMPDEST
- [61] PUSH2 0x0070
- [62] PUSH2 0x00cd
- [63] JUMP
- [64] JUMPDEST
- [65] STOP
- [66] JUMPDEST
- [67] PUSH0 0x
- [68] SLOAD
- [69] PUSH1 0x40
- [70] MLOAD
- [71] PUSH1 0x01
- [72] PUSH1 0x01
- [73] PUSH1 0xa0
- [74] SHL
- [75] SUB
- [76] SWAP1
- [77] SWAP2
- [78] AND
- [79] DUP2
- [80] MSTORE
- [81] PUSH1 0x20
- [82] ADD
- [83] JUMPDEST
- [84] PUSH1 0x40
- [85] MLOAD
- [86] DUP1
- [87] SWAP2
- [88] SUB
- [89] SWAP1
- [90] RETURN
- [91] JUMPDEST
- [92] PUSH2 0x0070
- [93] PUSH2 0x009f
- [94] CALLDATASIZE
- [95] PUSH1 0x04
- [96] PUSH2 0x02a0
- [97] JUMP
- [98] JUMPDEST
- [99] PUSH2 0x00e0
- [100] JUMP
- [101] JUMPDEST
- [102] PUSH2 0x00ac
- [103] PUSH2 0x011a
- [104] JUMP
- [105] JUMPDEST
- [106] PUSH1 0x40
- [107] MLOAD
- [108] SWAP1
- [109] DUP2
- [110] MSTORE
- [111] PUSH1 0x20
- [112] ADD
- [113] PUSH2 0x0088
- [114] JUMP
- [115] JUMPDEST
- [116] PUSH2 0x0070
- [117] PUSH2 0x00c8
- [118] CALLDATASIZE
- [119] PUSH1 0x04
- [120] PUSH2 0x02b7
- [121] JUMP
- [122] JUMPDEST
- [123] PUSH2 0x014b
- [124] JUMP
- [125] JUMPDEST
- [126] PUSH2 0x00d5
- [127] PUSH2 0x01e0
- [128] JUMP
- [129] JUMPDEST
- [130] PUSH2 0x00de
- [131] PUSH0 0x
- [132] PUSH2 0x0239
- [133] JUMP
- [134] JUMPDEST
- [135] JUMP
- [136] JUMPDEST
- [137] PUSH2 0x00e8
- [138] PUSH2 0x01e0
- [139] JUMP
- [140] JUMPDEST
- [141] PUSH1 0x01
- [142] SSTORE
- [143] PUSH0 0x
- [144] DUP1
- [145] SLOAD
- [146] PUSH32 0xffffffffffffffffffffff00ffffffffffffffffffffffffffffffffffffffff
- [147] AND
- [148] PUSH1 0x01
- [149] PUSH1 0xa0
- [150] SHL
- [151] OR
- [152] SWAP1
- [153] SSTORE
- [154] JUMP
- [155] JUMPDEST
- [156] PUSH0 0x
- [157] DUP1
- [158] SLOAD
- [159] PUSH1 0x01
- [160] PUSH1 0xa0
- [161] SHL
- [162] SWAP1
- [163] DIV
- [164] PUSH1 0xff
- [165] AND
- [166] PUSH2 0x0144
- [167] JUMPI
- [168] PUSH1 0x40
- [169] MLOAD
- [170] PUSH4 0x32596525
- [171] PUSH1 0xe2
- [172] SHL
- [173] DUP2
- [174] MSTORE
- [175] PUSH1 0x04
- [176] ADD
- [177] PUSH1 0x40
- [178] MLOAD
- [179] DUP1
- [180] SWAP2
- [181] SUB
- [182] SWAP1
- [183] REVERT
- [184] JUMPDEST
- [185] POP
- [186] PUSH1 0x01
- [187] SLOAD
- [188] SWAP1
- [189] JUMP
- [190] JUMPDEST
- [191] PUSH2 0x0153
- [192] PUSH2 0x01e0
- [193] JUMP
- [194] JUMPDEST
- [195] PUSH1 0x01
- [196] PUSH1 0x01
- [197] PUSH1 0xa0
- [198] SHL
- [199] SUB
- [200] DUP2
- [201] AND
- [202] PUSH2 0x01d4
- [203] JUMPI
- [204] PUSH1 0x40
- [205] MLOAD
- [206] PUSH3 0x461bcd
- [207] PUSH1 0xe5
- [208] SHL
- [209] DUP2
- [210] MSTORE
- [211] PUSH1 0x20
- [212] PUSH1 0x04
- [213] DUP3
- [214] ADD
- [215] MSTORE
- [216] PUSH1 0x26
- [217] PUSH1 0x24
- [218] DUP3
- [219] ADD
- [220] MSTORE
- [221] PUSH32 0x4f776e61626c653a206e6577206f776e657220697320746865207a65726f2061
- [222] PUSH1 0x44
- [223] DUP3
- [224] ADD
- [225] MSTORE
- [226] PUSH32 0x6464726573730000000000000000000000000000000000000000000000000000
- [227] PUSH1 0x64
- [228] DUP3
- [229] ADD
- [230] MSTORE
- [231] PUSH1 0x84
- [232] ADD
- [233] JUMPDEST
- [234] PUSH1 0x40
- [235] MLOAD
- [236] DUP1
- [237] SWAP2
- [238] SUB
- [239] SWAP1
- [240] REVERT
- [241] JUMPDEST
- [242] PUSH2 0x01dd
- [243] DUP2
- [244] PUSH2 0x0239
- [245] JUMP
- [246] JUMPDEST
- [247] POP
- [248] JUMP
- [249] JUMPDEST
- [250] PUSH0 0x
- [251] SLOAD
- [252] PUSH1 0x01
- [253] PUSH1 0x01
- [254] PUSH1 0xa0
- [255] SHL
- [256] SUB
- [257] AND
- [258] CALLER
- [259] EQ
- [260] PUSH2 0x00de
- [261] JUMPI
- [262] PUSH1 0x40
- [263] MLOAD
- [264] PUSH3 0x461bcd
- [265] PUSH1 0xe5
- [266] SHL
- [267] DUP2
- [268] MSTORE
- [269] PUSH1 0x20
- [270] PUSH1 0x04
- [271] DUP3
- [272] ADD
- [273] DUP2
- [274] SWAP1
- [275] MSTORE
- [276] PUSH1 0x24
- [277] DUP3
- [278] ADD
- [279] MSTORE
- [280] PUSH32 0x4f776e61626c653a2063616c6c6572206973206e6f7420746865206f776e6572
- [281] PUSH1 0x44
- [282] DUP3
- [283] ADD
- [284] MSTORE
- [285] PUSH1 0x64
- [286] ADD
- [287] PUSH2 0x01cb
- [288] JUMP
- [289] JUMPDEST
- [290] PUSH0 0x
- [291] DUP1
- [292] SLOAD
- [293] PUSH1 0x01
- [294] PUSH1 0x01
- [295] PUSH1 0xa0
- [296] SHL
- [297] SUB
- [298] DUP4
- [299] DUP2
- [300] AND
- [301] PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
- [302] DUP4
- [303] AND
- [304] DUP2
- [305] OR
- [306] DUP5
- [307] SSTORE
- [308] PUSH1 0x40
- [309] MLOAD
- [310] SWAP2
- [311] SWAP1
- [312] SWAP3
- [313] AND
- [314] SWAP3
- [315] DUP4
- [316] SWAP2
- [317] PUSH32 0x8be0079c531659141344cd1fd0a4f28419497f9722a3daafe3b4186f6b6457e0
- [318] SWAP2
- [319] SWAP1
- [320] LOG3
- [321] POP
- [322] POP
- [323] JUMP
- [324] JUMPDEST
- [325] PUSH0 0x
- [326] PUSH1 0x20
- [327] DUP3
- [328] DUP5
- [329] SUB
- [330] SLT
- [331] ISZERO
- [332] PUSH2 0x02b0
- [333] JUMPI
- [334] PUSH0 0x
- [335] DUP1
- [336] REVERT
- [337] JUMPDEST
- [338] POP
- [339] CALLDATALOAD
- [340] SWAP2
- [341] SWAP1
- [342] POP
- [343] JUMP
- [344] JUMPDEST
- [345] PUSH0 0x
- [346] PUSH1 0x20
- [347] DUP3
- [348] DUP5
- [349] SUB
- [350] SLT
- [351] ISZERO
- [352] PUSH2 0x02c7
- [353] JUMPI
- [354] PUSH0 0x
- [355] DUP1
- [356] REVERT
- [357] JUMPDEST
- [358] DUP2
- [359] CALLDATALOAD
- [360] PUSH1 0x01
- [361] PUSH1 0x01
- [362] PUSH1 0xa0
- [363] SHL
- [364] SUB
- [365] DUP2
- [366] AND
- [367] DUP2
- [368] EQ
- [369] PUSH2 0x02dd
- [370] JUMPI
- [371] PUSH0 0x
- [372] DUP1
- [373] REVERT
- [374] JUMPDEST
- [375] SWAP4
- [376] SWAP3
- [377] POP
- [378] POP
- [379] POP
- [380] JUMP
- [381] 'fe'(Unknown Opcode)
- [382] LOG2
- [383] PUSH5 0x6970667358
- [384] '22'(Unknown Opcode)
- [385] SLT
- [386] SHA3
- [387] 'd4'(Unknown Opcode)
- [388] LT
- [389] DUP13
- [390] 'b4'(Unknown Opcode)
- [391] '0c'(Unknown Opcode)
- [392] 'e2'(Unknown Opcode)
- [393] '2c'(Unknown Opcode)
- [394] DIV
- [395] MSIZE
- [396] '27'(Unknown Opcode)
- [397] EXTCODECOPY
- [398] PUSH13 0x798aa489ae99b5569d5e6b8d62
- [399] XOR
- [400] 'd3'(Unknown Opcode)