Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x0a
  • [4] PUSH1 0x0c
  • [5] JUMP
  • [6] JUMPDEST
  • [7] STOP
  • [8] JUMPDEST
  • [9] PUSH1 0x18
  • [10] PUSH1 0x14
  • [11] PUSH1 0x1a
  • [12] JUMP
  • [13] JUMPDEST
  • [14] PUSH1 0x51
  • [15] JUMP
  • [16] JUMPDEST
  • [17] JUMP
  • [18] JUMPDEST
  • [19] PUSH1 0x00
  • [20] PUSH1 0x4c
  • [21] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
  • [22] SLOAD
  • [23] PUSH1 0x01
  • [24] PUSH1 0x01
  • [25] PUSH1 0xa0
  • [26] SHL
  • [27] SUB
  • [28] AND
  • [29] SWAP1
  • [30] JUMP
  • [31] JUMPDEST
  • [32] SWAP1
  • [33] POP
  • [34] SWAP1
  • [35] JUMP
  • [36] JUMPDEST
  • [37] CALLDATASIZE
  • [38] PUSH1 0x00
  • [39] DUP1
  • [40] CALLDATACOPY
  • [41] PUSH1 0x00
  • [42] DUP1
  • [43] CALLDATASIZE
  • [44] PUSH1 0x00
  • [45] DUP5
  • [46] GAS
  • [47] DELEGATECALL
  • [48] RETURNDATASIZE
  • [49] PUSH1 0x00
  • [50] DUP1
  • [51] RETURNDATACOPY
  • [52] DUP1
  • [53] DUP1
  • [54] ISZERO
  • [55] PUSH1 0x6f
  • [56] JUMPI
  • [57] RETURNDATASIZE
  • [58] PUSH1 0x00
  • [59] RETURN
  • [60] JUMPDEST
  • [61] RETURNDATASIZE
  • [62] PUSH1 0x00
  • [63] REVERT
  • [64] 'fe'(Unknown Opcode)
  • [65] LOG2
  • [66] PUSH5 0x6970667358
  • [67] '22'(Unknown Opcode)
  • [68] SLT
  • [69] SHA3
  • [70] 'd0'(Unknown Opcode)
  • [71] '23'(Unknown Opcode)
  • [72] '2c'(Unknown Opcode)
  • [73] STATICCALL
  • [74] DUP2
  • [75] '21'(Unknown Opcode)
  • [76] PUSH13 0x3e4973e570f043b57ccb69ae4a
  • [77] DUP2
  • [78] 'b8'(Unknown Opcode)
  • [79] 'bc'(Unknown Opcode)
  • [80] MOD
  • [81] NUMBER
  • [82] CODESIZE