Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH1 0x0e
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH1 0x30
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x09ce9ccb
  • [24] EQ
  • [25] PUSH1 0x34
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0x3fb5c1cb
  • [29] EQ
  • [30] PUSH1 0x4e
  • [31] JUMPI
  • [32] JUMPDEST
  • [33] PUSH0 0x
  • [34] DUP1
  • [35] REVERT
  • [36] JUMPDEST
  • [37] PUSH1 0x3a
  • [38] PUSH1 0x66
  • [39] JUMP
  • [40] JUMPDEST
  • [41] PUSH1 0x40
  • [42] MLOAD
  • [43] PUSH1 0x45
  • [44] SWAP2
  • [45] SWAP1
  • [46] PUSH1 0x8a
  • [47] JUMP
  • [48] JUMPDEST
  • [49] PUSH1 0x40
  • [50] MLOAD
  • [51] DUP1
  • [52] SWAP2
  • [53] SUB
  • [54] SWAP1
  • [55] RETURN
  • [56] JUMPDEST
  • [57] PUSH1 0x64
  • [58] PUSH1 0x04
  • [59] DUP1
  • [60] CALLDATASIZE
  • [61] SUB
  • [62] DUP2
  • [63] ADD
  • [64] SWAP1
  • [65] PUSH1 0x60
  • [66] SWAP2
  • [67] SWAP1
  • [68] PUSH1 0xca
  • [69] JUMP
  • [70] JUMPDEST
  • [71] PUSH1 0x6b
  • [72] JUMP
  • [73] JUMPDEST
  • [74] STOP
  • [75] JUMPDEST
  • [76] PUSH0 0x
  • [77] SLOAD
  • [78] DUP2
  • [79] JUMP
  • [80] JUMPDEST
  • [81] DUP1
  • [82] PUSH0 0x
  • [83] DUP2
  • [84] SWAP1
  • [85] SSTORE
  • [86] POP
  • [87] POP
  • [88] JUMP
  • [89] JUMPDEST
  • [90] PUSH0 0x
  • [91] DUP2
  • [92] SWAP1
  • [93] POP
  • [94] SWAP2
  • [95] SWAP1
  • [96] POP
  • [97] JUMP
  • [98] JUMPDEST
  • [99] PUSH1 0x84
  • [100] DUP2
  • [101] PUSH1 0x74
  • [102] JUMP
  • [103] JUMPDEST
  • [104] DUP3
  • [105] MSTORE
  • [106] POP
  • [107] POP
  • [108] JUMP
  • [109] JUMPDEST
  • [110] PUSH0 0x
  • [111] PUSH1 0x20
  • [112] DUP3
  • [113] ADD
  • [114] SWAP1
  • [115] POP
  • [116] PUSH1 0x9b
  • [117] PUSH0 0x
  • [118] DUP4
  • [119] ADD
  • [120] DUP5
  • [121] PUSH1 0x7d
  • [122] JUMP
  • [123] JUMPDEST
  • [124] SWAP3
  • [125] SWAP2
  • [126] POP
  • [127] POP
  • [128] JUMP
  • [129] JUMPDEST
  • [130] PUSH0 0x
  • [131] DUP1
  • [132] REVERT
  • [133] JUMPDEST
  • [134] PUSH1 0xac
  • [135] DUP2
  • [136] PUSH1 0x74
  • [137] JUMP
  • [138] JUMPDEST
  • [139] DUP2
  • [140] EQ
  • [141] PUSH1 0xb5
  • [142] JUMPI
  • [143] PUSH0 0x
  • [144] DUP1
  • [145] REVERT
  • [146] JUMPDEST
  • [147] POP
  • [148] JUMP
  • [149] JUMPDEST
  • [150] PUSH0 0x
  • [151] DUP2
  • [152] CALLDATALOAD
  • [153] SWAP1
  • [154] POP
  • [155] PUSH1 0xc4
  • [156] DUP2
  • [157] PUSH1 0xa5
  • [158] JUMP
  • [159] JUMPDEST
  • [160] SWAP3
  • [161] SWAP2
  • [162] POP
  • [163] POP
  • [164] JUMP
  • [165] JUMPDEST
  • [166] PUSH0 0x
  • [167] PUSH1 0x20
  • [168] DUP3
  • [169] DUP5
  • [170] SUB
  • [171] SLT
  • [172] ISZERO
  • [173] PUSH1 0xdc
  • [174] JUMPI
  • [175] PUSH1 0xdb
  • [176] PUSH1 0xa1
  • [177] JUMP
  • [178] JUMPDEST
  • [179] JUMPDEST
  • [180] PUSH0 0x
  • [181] PUSH1 0xe7
  • [182] DUP5
  • [183] DUP3
  • [184] DUP6
  • [185] ADD
  • [186] PUSH1 0xb8
  • [187] JUMP
  • [188] JUMPDEST
  • [189] SWAP2
  • [190] POP
  • [191] POP
  • [192] SWAP3
  • [193] SWAP2
  • [194] POP
  • [195] POP
  • [196] JUMP
  • [197] 'fe'(Unknown Opcode)
  • [198] LOG2
  • [199] PUSH5 0x6970667358
  • [200] '22'(Unknown Opcode)
  • [201] SLT
  • [202] SHA3
  • [203] 'ab'(Unknown Opcode)
  • [204] SWAP14
  • [205] 'e7'(Unknown Opcode)
  • [206] 'd4'(Unknown Opcode)
  • [207] 'aa'(Unknown Opcode)
  • [208] BLOBHASH
  • [209] 'fe'(Unknown Opcode)
  • [210] MSTORE
  • [211] PUSH7 0xdc1be7f1bdbe1a
  • [212] '0f'(Unknown Opcode)
  • [213] TIMESTAMP
  • [214] DUP15
  • [215] PUSH1 0x76
  • [216] CALLDATALOAD
  • [217] SHL
  • [218] '0c'(Unknown Opcode)
  • [219] DUP4
  • [220] 'cf'(Unknown Opcode)
  • [221] 'ad'(Unknown Opcode)
  • [222] DIV
  • [223] 'c5'(Unknown Opcode)
  • [224] SWAP8