Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0064
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x9168cd71
  • [24] GT
  • [25] PUSH2 0x004d
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0x9168cd71
  • [29] EQ
  • [30] PUSH2 0x0091
  • [31] JUMPI
  • [32] DUP1
  • [33] PUSH4 0xc8dc9bc4
  • [34] EQ
  • [35] PUSH2 0x00a4
  • [36] JUMPI
  • [37] DUP1
  • [38] PUSH4 0xf2fde38b
  • [39] EQ
  • [40] PUSH2 0x00ba
  • [41] JUMPI
  • [42] PUSH0 0x
  • [43] DUP1
  • [44] REVERT
  • [45] JUMPDEST
  • [46] DUP1
  • [47] PUSH4 0x715018a6
  • [48] EQ
  • [49] PUSH2 0x0068
  • [50] JUMPI
  • [51] DUP1
  • [52] PUSH4 0x8da5cb5b
  • [53] EQ
  • [54] PUSH2 0x0072
  • [55] JUMPI
  • [56] JUMPDEST
  • [57] PUSH0 0x
  • [58] DUP1
  • [59] REVERT
  • [60] JUMPDEST
  • [61] PUSH2 0x0070
  • [62] PUSH2 0x00cd
  • [63] JUMP
  • [64] JUMPDEST
  • [65] STOP
  • [66] JUMPDEST
  • [67] PUSH0 0x
  • [68] SLOAD
  • [69] PUSH1 0x40
  • [70] MLOAD
  • [71] PUSH1 0x01
  • [72] PUSH1 0x01
  • [73] PUSH1 0xa0
  • [74] SHL
  • [75] SUB
  • [76] SWAP1
  • [77] SWAP2
  • [78] AND
  • [79] DUP2
  • [80] MSTORE
  • [81] PUSH1 0x20
  • [82] ADD
  • [83] JUMPDEST
  • [84] PUSH1 0x40
  • [85] MLOAD
  • [86] DUP1
  • [87] SWAP2
  • [88] SUB
  • [89] SWAP1
  • [90] RETURN
  • [91] JUMPDEST
  • [92] PUSH2 0x0070
  • [93] PUSH2 0x009f
  • [94] CALLDATASIZE
  • [95] PUSH1 0x04
  • [96] PUSH2 0x02a0
  • [97] JUMP
  • [98] JUMPDEST
  • [99] PUSH2 0x00e0
  • [100] JUMP
  • [101] JUMPDEST
  • [102] PUSH2 0x00ac
  • [103] PUSH2 0x011a
  • [104] JUMP
  • [105] JUMPDEST
  • [106] PUSH1 0x40
  • [107] MLOAD
  • [108] SWAP1
  • [109] DUP2
  • [110] MSTORE
  • [111] PUSH1 0x20
  • [112] ADD
  • [113] PUSH2 0x0088
  • [114] JUMP
  • [115] JUMPDEST
  • [116] PUSH2 0x0070
  • [117] PUSH2 0x00c8
  • [118] CALLDATASIZE
  • [119] PUSH1 0x04
  • [120] PUSH2 0x02b7
  • [121] JUMP
  • [122] JUMPDEST
  • [123] PUSH2 0x014b
  • [124] JUMP
  • [125] JUMPDEST
  • [126] PUSH2 0x00d5
  • [127] PUSH2 0x01e0
  • [128] JUMP
  • [129] JUMPDEST
  • [130] PUSH2 0x00de
  • [131] PUSH0 0x
  • [132] PUSH2 0x0239
  • [133] JUMP
  • [134] JUMPDEST
  • [135] JUMP
  • [136] JUMPDEST
  • [137] PUSH2 0x00e8
  • [138] PUSH2 0x01e0
  • [139] JUMP
  • [140] JUMPDEST
  • [141] PUSH1 0x01
  • [142] SSTORE
  • [143] PUSH0 0x
  • [144] DUP1
  • [145] SLOAD
  • [146] PUSH32 0xffffffffffffffffffffff00ffffffffffffffffffffffffffffffffffffffff
  • [147] AND
  • [148] PUSH1 0x01
  • [149] PUSH1 0xa0
  • [150] SHL
  • [151] OR
  • [152] SWAP1
  • [153] SSTORE
  • [154] JUMP
  • [155] JUMPDEST
  • [156] PUSH0 0x
  • [157] DUP1
  • [158] SLOAD
  • [159] PUSH1 0x01
  • [160] PUSH1 0xa0
  • [161] SHL
  • [162] SWAP1
  • [163] DIV
  • [164] PUSH1 0xff
  • [165] AND
  • [166] PUSH2 0x0144
  • [167] JUMPI
  • [168] PUSH1 0x40
  • [169] MLOAD
  • [170] PUSH4 0x32596525
  • [171] PUSH1 0xe2
  • [172] SHL
  • [173] DUP2
  • [174] MSTORE
  • [175] PUSH1 0x04
  • [176] ADD
  • [177] PUSH1 0x40
  • [178] MLOAD
  • [179] DUP1
  • [180] SWAP2
  • [181] SUB
  • [182] SWAP1
  • [183] REVERT
  • [184] JUMPDEST
  • [185] POP
  • [186] PUSH1 0x01
  • [187] SLOAD
  • [188] SWAP1
  • [189] JUMP
  • [190] JUMPDEST
  • [191] PUSH2 0x0153
  • [192] PUSH2 0x01e0
  • [193] JUMP
  • [194] JUMPDEST
  • [195] PUSH1 0x01
  • [196] PUSH1 0x01
  • [197] PUSH1 0xa0
  • [198] SHL
  • [199] SUB
  • [200] DUP2
  • [201] AND
  • [202] PUSH2 0x01d4
  • [203] JUMPI
  • [204] PUSH1 0x40
  • [205] MLOAD
  • [206] PUSH3 0x461bcd
  • [207] PUSH1 0xe5
  • [208] SHL
  • [209] DUP2
  • [210] MSTORE
  • [211] PUSH1 0x20
  • [212] PUSH1 0x04
  • [213] DUP3
  • [214] ADD
  • [215] MSTORE
  • [216] PUSH1 0x26
  • [217] PUSH1 0x24
  • [218] DUP3
  • [219] ADD
  • [220] MSTORE
  • [221] PUSH32 0x4f776e61626c653a206e6577206f776e657220697320746865207a65726f2061
  • [222] PUSH1 0x44
  • [223] DUP3
  • [224] ADD
  • [225] MSTORE
  • [226] PUSH32 0x6464726573730000000000000000000000000000000000000000000000000000
  • [227] PUSH1 0x64
  • [228] DUP3
  • [229] ADD
  • [230] MSTORE
  • [231] PUSH1 0x84
  • [232] ADD
  • [233] JUMPDEST
  • [234] PUSH1 0x40
  • [235] MLOAD
  • [236] DUP1
  • [237] SWAP2
  • [238] SUB
  • [239] SWAP1
  • [240] REVERT
  • [241] JUMPDEST
  • [242] PUSH2 0x01dd
  • [243] DUP2
  • [244] PUSH2 0x0239
  • [245] JUMP
  • [246] JUMPDEST
  • [247] POP
  • [248] JUMP
  • [249] JUMPDEST
  • [250] PUSH0 0x
  • [251] SLOAD
  • [252] PUSH1 0x01
  • [253] PUSH1 0x01
  • [254] PUSH1 0xa0
  • [255] SHL
  • [256] SUB
  • [257] AND
  • [258] CALLER
  • [259] EQ
  • [260] PUSH2 0x00de
  • [261] JUMPI
  • [262] PUSH1 0x40
  • [263] MLOAD
  • [264] PUSH3 0x461bcd
  • [265] PUSH1 0xe5
  • [266] SHL
  • [267] DUP2
  • [268] MSTORE
  • [269] PUSH1 0x20
  • [270] PUSH1 0x04
  • [271] DUP3
  • [272] ADD
  • [273] DUP2
  • [274] SWAP1
  • [275] MSTORE
  • [276] PUSH1 0x24
  • [277] DUP3
  • [278] ADD
  • [279] MSTORE
  • [280] PUSH32 0x4f776e61626c653a2063616c6c6572206973206e6f7420746865206f776e6572
  • [281] PUSH1 0x44
  • [282] DUP3
  • [283] ADD
  • [284] MSTORE
  • [285] PUSH1 0x64
  • [286] ADD
  • [287] PUSH2 0x01cb
  • [288] JUMP
  • [289] JUMPDEST
  • [290] PUSH0 0x
  • [291] DUP1
  • [292] SLOAD
  • [293] PUSH1 0x01
  • [294] PUSH1 0x01
  • [295] PUSH1 0xa0
  • [296] SHL
  • [297] SUB
  • [298] DUP4
  • [299] DUP2
  • [300] AND
  • [301] PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
  • [302] DUP4
  • [303] AND
  • [304] DUP2
  • [305] OR
  • [306] DUP5
  • [307] SSTORE
  • [308] PUSH1 0x40
  • [309] MLOAD
  • [310] SWAP2
  • [311] SWAP1
  • [312] SWAP3
  • [313] AND
  • [314] SWAP3
  • [315] DUP4
  • [316] SWAP2
  • [317] PUSH32 0x8be0079c531659141344cd1fd0a4f28419497f9722a3daafe3b4186f6b6457e0
  • [318] SWAP2
  • [319] SWAP1
  • [320] LOG3
  • [321] POP
  • [322] POP
  • [323] JUMP
  • [324] JUMPDEST
  • [325] PUSH0 0x
  • [326] PUSH1 0x20
  • [327] DUP3
  • [328] DUP5
  • [329] SUB
  • [330] SLT
  • [331] ISZERO
  • [332] PUSH2 0x02b0
  • [333] JUMPI
  • [334] PUSH0 0x
  • [335] DUP1
  • [336] REVERT
  • [337] JUMPDEST
  • [338] POP
  • [339] CALLDATALOAD
  • [340] SWAP2
  • [341] SWAP1
  • [342] POP
  • [343] JUMP
  • [344] JUMPDEST
  • [345] PUSH0 0x
  • [346] PUSH1 0x20
  • [347] DUP3
  • [348] DUP5
  • [349] SUB
  • [350] SLT
  • [351] ISZERO
  • [352] PUSH2 0x02c7
  • [353] JUMPI
  • [354] PUSH0 0x
  • [355] DUP1
  • [356] REVERT
  • [357] JUMPDEST
  • [358] DUP2
  • [359] CALLDATALOAD
  • [360] PUSH1 0x01
  • [361] PUSH1 0x01
  • [362] PUSH1 0xa0
  • [363] SHL
  • [364] SUB
  • [365] DUP2
  • [366] AND
  • [367] DUP2
  • [368] EQ
  • [369] PUSH2 0x02dd
  • [370] JUMPI
  • [371] PUSH0 0x
  • [372] DUP1
  • [373] REVERT
  • [374] JUMPDEST
  • [375] SWAP4
  • [376] SWAP3
  • [377] POP
  • [378] POP
  • [379] POP
  • [380] JUMP
  • [381] 'fe'(Unknown Opcode)
  • [382] LOG2
  • [383] PUSH5 0x6970667358
  • [384] '22'(Unknown Opcode)
  • [385] SLT
  • [386] SHA3
  • [387] 'd4'(Unknown Opcode)
  • [388] LT
  • [389] DUP13
  • [390] 'b4'(Unknown Opcode)
  • [391] '0c'(Unknown Opcode)
  • [392] 'e2'(Unknown Opcode)
  • [393] '2c'(Unknown Opcode)
  • [394] DIV
  • [395] MSIZE
  • [396] '27'(Unknown Opcode)
  • [397] EXTCODECOPY
  • [398] PUSH13 0x798aa489ae99b5569d5e6b8d62
  • [399] XOR
  • [400] 'd3'(Unknown Opcode)