Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH1 0x0f
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH1 0x28
  • [17] JUMPI
  • [18] PUSH1 0x00
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x19ff1d21
  • [24] EQ
  • [25] PUSH1 0x2d
  • [26] JUMPI
  • [27] JUMPDEST
  • [28] PUSH1 0x00
  • [29] DUP1
  • [30] REVERT
  • [31] JUMPDEST
  • [32] PUSH1 0x33
  • [33] PUSH1 0xab
  • [34] JUMP
  • [35] JUMPDEST
  • [36] PUSH1 0x40
  • [37] MLOAD
  • [38] DUP1
  • [39] DUP1
  • [40] PUSH1 0x20
  • [41] ADD
  • [42] DUP3
  • [43] DUP2
  • [44] SUB
  • [45] DUP3
  • [46] MSTORE
  • [47] DUP4
  • [48] DUP2
  • [49] DUP2
  • [50] MLOAD
  • [51] DUP2
  • [52] MSTORE
  • [53] PUSH1 0x20
  • [54] ADD
  • [55] SWAP2
  • [56] POP
  • [57] DUP1
  • [58] MLOAD
  • [59] SWAP1
  • [60] PUSH1 0x20
  • [61] ADD
  • [62] SWAP1
  • [63] DUP1
  • [64] DUP4
  • [65] DUP4
  • [66] PUSH1 0x00
  • [67] JUMPDEST
  • [68] DUP4
  • [69] DUP2
  • [70] LT
  • [71] ISZERO
  • [72] PUSH1 0x71
  • [73] JUMPI
  • [74] DUP1
  • [75] DUP3
  • [76] ADD
  • [77] MLOAD
  • [78] DUP2
  • [79] DUP5
  • [80] ADD
  • [81] MSTORE
  • [82] PUSH1 0x20
  • [83] DUP2
  • [84] ADD
  • [85] SWAP1
  • [86] POP
  • [87] PUSH1 0x58
  • [88] JUMP
  • [89] JUMPDEST
  • [90] POP
  • [91] POP
  • [92] POP
  • [93] POP
  • [94] SWAP1
  • [95] POP
  • [96] SWAP1
  • [97] DUP2
  • [98] ADD
  • [99] SWAP1
  • [100] PUSH1 0x1f
  • [101] AND
  • [102] DUP1
  • [103] ISZERO
  • [104] PUSH1 0x9d
  • [105] JUMPI
  • [106] DUP1
  • [107] DUP3
  • [108] SUB
  • [109] DUP1
  • [110] MLOAD
  • [111] PUSH1 0x01
  • [112] DUP4
  • [113] PUSH1 0x20
  • [114] SUB
  • [115] PUSH2 0x0100
  • [116] EXP
  • [117] SUB
  • [118] NOT
  • [119] AND
  • [120] DUP2
  • [121] MSTORE
  • [122] PUSH1 0x20
  • [123] ADD
  • [124] SWAP2
  • [125] POP
  • [126] JUMPDEST
  • [127] POP
  • [128] SWAP3
  • [129] POP
  • [130] POP
  • [131] POP
  • [132] PUSH1 0x40
  • [133] MLOAD
  • [134] DUP1
  • [135] SWAP2
  • [136] SUB
  • [137] SWAP1
  • [138] RETURN
  • [139] JUMPDEST
  • [140] PUSH1 0x60
  • [141] PUSH1 0x40
  • [142] MLOAD
  • [143] DUP1
  • [144] PUSH1 0x40
  • [145] ADD
  • [146] PUSH1 0x40
  • [147] MSTORE
  • [148] DUP1
  • [149] PUSH1 0x0c
  • [150] DUP2
  • [151] MSTORE
  • [152] PUSH1 0x20
  • [153] ADD
  • [154] PUSH32 0x48656c6c6f20576f726c64210000000000000000000000000000000000000000
  • [155] DUP2
  • [156] MSTORE
  • [157] POP
  • [158] SWAP1
  • [159] POP
  • [160] SWAP1
  • [161] JUMP
  • [162] 'fe'(Unknown Opcode)
  • [163] LOG2
  • [164] PUSH5 0x6970667358
  • [165] '22'(Unknown Opcode)
  • [166] SLT
  • [167] SHA3
  • [168] XOR
  • [169] PUSH20 0xfdca109423b2f04677845ef3009db2b55461b2c7
  • [170] SWAP16
  • [171] 'b1'(Unknown Opcode)
  • [172] 'ce'(Unknown Opcode)
  • [173] '23'(Unknown Opcode)
  • [174] 'b6'(Unknown Opcode)
  • [175] 'c1'(Unknown Opcode)
  • [176] MUL
  • [177] COINBASE
  • [178] '29'(Unknown Opcode)
  • [179] EXTCODEHASH
  • [180] PUSH5 0x736f6c6343
  • [181] STOP
  • [182] SMOD
  • [183] DIV
  • [184] STOP
  • [185] CALLER