Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x004a
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x06661abd
  • [24] EQ
  • [25] PUSH2 0x004e
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0x371303c0
  • [29] EQ
  • [30] PUSH2 0x006c
  • [31] JUMPI
  • [32] DUP1
  • [33] PUSH4 0x6d4ce63c
  • [34] EQ
  • [35] PUSH2 0x0076
  • [36] JUMPI
  • [37] DUP1
  • [38] PUSH4 0xb3bcfa82
  • [39] EQ
  • [40] PUSH2 0x0094
  • [41] JUMPI
  • [42] JUMPDEST
  • [43] PUSH0 0x
  • [44] DUP1
  • [45] REVERT
  • [46] JUMPDEST
  • [47] PUSH2 0x0056
  • [48] PUSH2 0x009e
  • [49] JUMP
  • [50] JUMPDEST
  • [51] PUSH1 0x40
  • [52] MLOAD
  • [53] PUSH2 0x0063
  • [54] SWAP2
  • [55] SWAP1
  • [56] PUSH2 0x00f7
  • [57] JUMP
  • [58] JUMPDEST
  • [59] PUSH1 0x40
  • [60] MLOAD
  • [61] DUP1
  • [62] SWAP2
  • [63] SUB
  • [64] SWAP1
  • [65] RETURN
  • [66] JUMPDEST
  • [67] PUSH2 0x0074
  • [68] PUSH2 0x00a3
  • [69] JUMP
  • [70] JUMPDEST
  • [71] STOP
  • [72] JUMPDEST
  • [73] PUSH2 0x007e
  • [74] PUSH2 0x00bd
  • [75] JUMP
  • [76] JUMPDEST
  • [77] PUSH1 0x40
  • [78] MLOAD
  • [79] PUSH2 0x008b
  • [80] SWAP2
  • [81] SWAP1
  • [82] PUSH2 0x00f7
  • [83] JUMP
  • [84] JUMPDEST
  • [85] PUSH1 0x40
  • [86] MLOAD
  • [87] DUP1
  • [88] SWAP2
  • [89] SUB
  • [90] SWAP1
  • [91] RETURN
  • [92] JUMPDEST
  • [93] PUSH2 0x009c
  • [94] PUSH2 0x00c5
  • [95] JUMP
  • [96] JUMPDEST
  • [97] STOP
  • [98] JUMPDEST
  • [99] PUSH0 0x
  • [100] SLOAD
  • [101] DUP2
  • [102] JUMP
  • [103] JUMPDEST
  • [104] PUSH1 0x01
  • [105] PUSH0 0x
  • [106] DUP1
  • [107] DUP3
  • [108] DUP3
  • [109] SLOAD
  • [110] PUSH2 0x00b4
  • [111] SWAP2
  • [112] SWAP1
  • [113] PUSH2 0x013d
  • [114] JUMP
  • [115] JUMPDEST
  • [116] SWAP3
  • [117] POP
  • [118] POP
  • [119] DUP2
  • [120] SWAP1
  • [121] SSTORE
  • [122] POP
  • [123] JUMP
  • [124] JUMPDEST
  • [125] PUSH0 0x
  • [126] DUP1
  • [127] SLOAD
  • [128] SWAP1
  • [129] POP
  • [130] SWAP1
  • [131] JUMP
  • [132] JUMPDEST
  • [133] PUSH1 0x01
  • [134] PUSH0 0x
  • [135] DUP1
  • [136] DUP3
  • [137] DUP3
  • [138] SLOAD
  • [139] PUSH2 0x00d6
  • [140] SWAP2
  • [141] SWAP1
  • [142] PUSH2 0x0170
  • [143] JUMP
  • [144] JUMPDEST
  • [145] SWAP3
  • [146] POP
  • [147] POP
  • [148] DUP2
  • [149] SWAP1
  • [150] SSTORE
  • [151] POP
  • [152] JUMP
  • [153] JUMPDEST
  • [154] PUSH0 0x
  • [155] DUP2
  • [156] SWAP1
  • [157] POP
  • [158] SWAP2
  • [159] SWAP1
  • [160] POP
  • [161] JUMP
  • [162] JUMPDEST
  • [163] PUSH2 0x00f1
  • [164] DUP2
  • [165] PUSH2 0x00df
  • [166] JUMP
  • [167] JUMPDEST
  • [168] DUP3
  • [169] MSTORE
  • [170] POP
  • [171] POP
  • [172] JUMP
  • [173] JUMPDEST
  • [174] PUSH0 0x
  • [175] PUSH1 0x20
  • [176] DUP3
  • [177] ADD
  • [178] SWAP1
  • [179] POP
  • [180] PUSH2 0x010a
  • [181] PUSH0 0x
  • [182] DUP4
  • [183] ADD
  • [184] DUP5
  • [185] PUSH2 0x00e8
  • [186] JUMP
  • [187] JUMPDEST
  • [188] SWAP3
  • [189] SWAP2
  • [190] POP
  • [191] POP
  • [192] JUMP
  • [193] JUMPDEST
  • [194] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
  • [195] PUSH0 0x
  • [196] MSTORE
  • [197] PUSH1 0x11
  • [198] PUSH1 0x04
  • [199] MSTORE
  • [200] PUSH1 0x24
  • [201] PUSH0 0x
  • [202] REVERT
  • [203] JUMPDEST
  • [204] PUSH0 0x
  • [205] PUSH2 0x0147
  • [206] DUP3
  • [207] PUSH2 0x00df
  • [208] JUMP
  • [209] JUMPDEST
  • [210] SWAP2
  • [211] POP
  • [212] PUSH2 0x0152
  • [213] DUP4
  • [214] PUSH2 0x00df
  • [215] JUMP
  • [216] JUMPDEST
  • [217] SWAP3
  • [218] POP
  • [219] DUP3
  • [220] DUP3
  • [221] ADD
  • [222] SWAP1
  • [223] POP
  • [224] DUP1
  • [225] DUP3
  • [226] GT
  • [227] ISZERO
  • [228] PUSH2 0x016a
  • [229] JUMPI
  • [230] PUSH2 0x0169
  • [231] PUSH2 0x0110
  • [232] JUMP
  • [233] JUMPDEST
  • [234] JUMPDEST
  • [235] SWAP3
  • [236] SWAP2
  • [237] POP
  • [238] POP
  • [239] JUMP
  • [240] JUMPDEST
  • [241] PUSH0 0x
  • [242] PUSH2 0x017a
  • [243] DUP3
  • [244] PUSH2 0x00df
  • [245] JUMP
  • [246] JUMPDEST
  • [247] SWAP2
  • [248] POP
  • [249] PUSH2 0x0185
  • [250] DUP4
  • [251] PUSH2 0x00df
  • [252] JUMP
  • [253] JUMPDEST
  • [254] SWAP3
  • [255] POP
  • [256] DUP3
  • [257] DUP3
  • [258] SUB
  • [259] SWAP1
  • [260] POP
  • [261] DUP2
  • [262] DUP2
  • [263] GT
  • [264] ISZERO
  • [265] PUSH2 0x019d
  • [266] JUMPI
  • [267] PUSH2 0x019c
  • [268] PUSH2 0x0110
  • [269] JUMP
  • [270] JUMPDEST
  • [271] JUMPDEST
  • [272] SWAP3
  • [273] SWAP2
  • [274] POP
  • [275] POP
  • [276] JUMP
  • [277] 'fe'(Unknown Opcode)
  • [278] LOG2
  • [279] PUSH5 0x6970667358
  • [280] '22'(Unknown Opcode)
  • [281] SLT
  • [282] SHA3
  • [283] CALLDATACOPY
  • [284] DUP9
  • [285] 'ea'(Unknown Opcode)
  • [286] XOR
  • [287] 'e7'(Unknown Opcode)
  • [288] 'd1'(Unknown Opcode)
  • [289] 'e3'(Unknown Opcode)
  • [290] PUSH8 0x84427e8ef5458251
  • [291] JUMPI
  • [292] MSTORE8
  • [293] 'd6'(Unknown Opcode)
  • [294] DELEGATECALL
  • [295] 'af'(Unknown Opcode)
  • [296] SWAP7
  • [297] SWAP10
  • [298] '4b'(Unknown Opcode)
  • [299] '2f'(Unknown Opcode)
  • [300] DUP11