Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLVALUE
- [4] DUP1
- [5] ISZERO
- [6] PUSH2 0x000f
- [7] JUMPI
- [8] PUSH0 0x
- [9] DUP1
- [10] REVERT
- [11] JUMPDEST
- [12] POP
- [13] PUSH1 0x04
- [14] CALLDATASIZE
- [15] LT
- [16] PUSH2 0x004a
- [17] JUMPI
- [18] PUSH0 0x
- [19] CALLDATALOAD
- [20] PUSH1 0xe0
- [21] SHR
- [22] DUP1
- [23] PUSH4 0x06661abd
- [24] EQ
- [25] PUSH2 0x004e
- [26] JUMPI
- [27] DUP1
- [28] PUSH4 0x371303c0
- [29] EQ
- [30] PUSH2 0x006c
- [31] JUMPI
- [32] DUP1
- [33] PUSH4 0x6d4ce63c
- [34] EQ
- [35] PUSH2 0x0076
- [36] JUMPI
- [37] DUP1
- [38] PUSH4 0xb3bcfa82
- [39] EQ
- [40] PUSH2 0x0094
- [41] JUMPI
- [42] JUMPDEST
- [43] PUSH0 0x
- [44] DUP1
- [45] REVERT
- [46] JUMPDEST
- [47] PUSH2 0x0056
- [48] PUSH2 0x009e
- [49] JUMP
- [50] JUMPDEST
- [51] PUSH1 0x40
- [52] MLOAD
- [53] PUSH2 0x0063
- [54] SWAP2
- [55] SWAP1
- [56] PUSH2 0x00f7
- [57] JUMP
- [58] JUMPDEST
- [59] PUSH1 0x40
- [60] MLOAD
- [61] DUP1
- [62] SWAP2
- [63] SUB
- [64] SWAP1
- [65] RETURN
- [66] JUMPDEST
- [67] PUSH2 0x0074
- [68] PUSH2 0x00a3
- [69] JUMP
- [70] JUMPDEST
- [71] STOP
- [72] JUMPDEST
- [73] PUSH2 0x007e
- [74] PUSH2 0x00bd
- [75] JUMP
- [76] JUMPDEST
- [77] PUSH1 0x40
- [78] MLOAD
- [79] PUSH2 0x008b
- [80] SWAP2
- [81] SWAP1
- [82] PUSH2 0x00f7
- [83] JUMP
- [84] JUMPDEST
- [85] PUSH1 0x40
- [86] MLOAD
- [87] DUP1
- [88] SWAP2
- [89] SUB
- [90] SWAP1
- [91] RETURN
- [92] JUMPDEST
- [93] PUSH2 0x009c
- [94] PUSH2 0x00c5
- [95] JUMP
- [96] JUMPDEST
- [97] STOP
- [98] JUMPDEST
- [99] PUSH0 0x
- [100] SLOAD
- [101] DUP2
- [102] JUMP
- [103] JUMPDEST
- [104] PUSH1 0x01
- [105] PUSH0 0x
- [106] DUP1
- [107] DUP3
- [108] DUP3
- [109] SLOAD
- [110] PUSH2 0x00b4
- [111] SWAP2
- [112] SWAP1
- [113] PUSH2 0x013d
- [114] JUMP
- [115] JUMPDEST
- [116] SWAP3
- [117] POP
- [118] POP
- [119] DUP2
- [120] SWAP1
- [121] SSTORE
- [122] POP
- [123] JUMP
- [124] JUMPDEST
- [125] PUSH0 0x
- [126] DUP1
- [127] SLOAD
- [128] SWAP1
- [129] POP
- [130] SWAP1
- [131] JUMP
- [132] JUMPDEST
- [133] PUSH1 0x01
- [134] PUSH0 0x
- [135] DUP1
- [136] DUP3
- [137] DUP3
- [138] SLOAD
- [139] PUSH2 0x00d6
- [140] SWAP2
- [141] SWAP1
- [142] PUSH2 0x0170
- [143] JUMP
- [144] JUMPDEST
- [145] SWAP3
- [146] POP
- [147] POP
- [148] DUP2
- [149] SWAP1
- [150] SSTORE
- [151] POP
- [152] JUMP
- [153] JUMPDEST
- [154] PUSH0 0x
- [155] DUP2
- [156] SWAP1
- [157] POP
- [158] SWAP2
- [159] SWAP1
- [160] POP
- [161] JUMP
- [162] JUMPDEST
- [163] PUSH2 0x00f1
- [164] DUP2
- [165] PUSH2 0x00df
- [166] JUMP
- [167] JUMPDEST
- [168] DUP3
- [169] MSTORE
- [170] POP
- [171] POP
- [172] JUMP
- [173] JUMPDEST
- [174] PUSH0 0x
- [175] PUSH1 0x20
- [176] DUP3
- [177] ADD
- [178] SWAP1
- [179] POP
- [180] PUSH2 0x010a
- [181] PUSH0 0x
- [182] DUP4
- [183] ADD
- [184] DUP5
- [185] PUSH2 0x00e8
- [186] JUMP
- [187] JUMPDEST
- [188] SWAP3
- [189] SWAP2
- [190] POP
- [191] POP
- [192] JUMP
- [193] JUMPDEST
- [194] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
- [195] PUSH0 0x
- [196] MSTORE
- [197] PUSH1 0x11
- [198] PUSH1 0x04
- [199] MSTORE
- [200] PUSH1 0x24
- [201] PUSH0 0x
- [202] REVERT
- [203] JUMPDEST
- [204] PUSH0 0x
- [205] PUSH2 0x0147
- [206] DUP3
- [207] PUSH2 0x00df
- [208] JUMP
- [209] JUMPDEST
- [210] SWAP2
- [211] POP
- [212] PUSH2 0x0152
- [213] DUP4
- [214] PUSH2 0x00df
- [215] JUMP
- [216] JUMPDEST
- [217] SWAP3
- [218] POP
- [219] DUP3
- [220] DUP3
- [221] ADD
- [222] SWAP1
- [223] POP
- [224] DUP1
- [225] DUP3
- [226] GT
- [227] ISZERO
- [228] PUSH2 0x016a
- [229] JUMPI
- [230] PUSH2 0x0169
- [231] PUSH2 0x0110
- [232] JUMP
- [233] JUMPDEST
- [234] JUMPDEST
- [235] SWAP3
- [236] SWAP2
- [237] POP
- [238] POP
- [239] JUMP
- [240] JUMPDEST
- [241] PUSH0 0x
- [242] PUSH2 0x017a
- [243] DUP3
- [244] PUSH2 0x00df
- [245] JUMP
- [246] JUMPDEST
- [247] SWAP2
- [248] POP
- [249] PUSH2 0x0185
- [250] DUP4
- [251] PUSH2 0x00df
- [252] JUMP
- [253] JUMPDEST
- [254] SWAP3
- [255] POP
- [256] DUP3
- [257] DUP3
- [258] SUB
- [259] SWAP1
- [260] POP
- [261] DUP2
- [262] DUP2
- [263] GT
- [264] ISZERO
- [265] PUSH2 0x019d
- [266] JUMPI
- [267] PUSH2 0x019c
- [268] PUSH2 0x0110
- [269] JUMP
- [270] JUMPDEST
- [271] JUMPDEST
- [272] SWAP3
- [273] SWAP2
- [274] POP
- [275] POP
- [276] JUMP
- [277] 'fe'(Unknown Opcode)
- [278] LOG2
- [279] PUSH5 0x6970667358
- [280] '22'(Unknown Opcode)
- [281] SLT
- [282] SHA3
- [283] CALLDATACOPY
- [284] DUP9
- [285] 'ea'(Unknown Opcode)
- [286] XOR
- [287] 'e7'(Unknown Opcode)
- [288] 'd1'(Unknown Opcode)
- [289] 'e3'(Unknown Opcode)
- [290] PUSH8 0x84427e8ef5458251
- [291] JUMPI
- [292] MSTORE8
- [293] 'd6'(Unknown Opcode)
- [294] DELEGATECALL
- [295] 'af'(Unknown Opcode)
- [296] SWAP7
- [297] SWAP10
- [298] '4b'(Unknown Opcode)
- [299] '2f'(Unknown Opcode)
- [300] DUP11