Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x04
  • [4] CALLDATASIZE
  • [5] LT
  • [6] PUSH2 0x0043
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] CALLDATALOAD
  • [10] PUSH1 0xe0
  • [11] SHR
  • [12] DUP1
  • [13] PUSH4 0x3fb5c1cb
  • [14] EQ
  • [15] PUSH2 0x004f
  • [16] JUMPI
  • [17] DUP1
  • [18] PUSH4 0x8381f58a
  • [19] EQ
  • [20] PUSH2 0x0071
  • [21] JUMPI
  • [22] DUP1
  • [23] PUSH4 0x89ee049c
  • [24] EQ
  • [25] PUSH2 0x0099
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0xd09de08a
  • [29] EQ
  • [30] PUSH2 0x00ae
  • [31] JUMPI
  • [32] PUSH1 0x00
  • [33] DUP1
  • [34] REVERT
  • [35] JUMPDEST
  • [36] CALLDATASIZE
  • [37] PUSH2 0x004a
  • [38] JUMPI
  • [39] STOP
  • [40] JUMPDEST
  • [41] PUSH1 0x00
  • [42] DUP1
  • [43] REVERT
  • [44] JUMPDEST
  • [45] CALLVALUE
  • [46] DUP1
  • [47] ISZERO
  • [48] PUSH2 0x005b
  • [49] JUMPI
  • [50] PUSH1 0x00
  • [51] DUP1
  • [52] REVERT
  • [53] JUMPDEST
  • [54] POP
  • [55] PUSH2 0x006f
  • [56] PUSH2 0x006a
  • [57] CALLDATASIZE
  • [58] PUSH1 0x04
  • [59] PUSH2 0x0143
  • [60] JUMP
  • [61] JUMPDEST
  • [62] PUSH1 0x00
  • [63] SSTORE
  • [64] JUMP
  • [65] JUMPDEST
  • [66] STOP
  • [67] JUMPDEST
  • [68] CALLVALUE
  • [69] DUP1
  • [70] ISZERO
  • [71] PUSH2 0x007d
  • [72] JUMPI
  • [73] PUSH1 0x00
  • [74] DUP1
  • [75] REVERT
  • [76] JUMPDEST
  • [77] POP
  • [78] PUSH2 0x0087
  • [79] PUSH1 0x00
  • [80] SLOAD
  • [81] DUP2
  • [82] JUMP
  • [83] JUMPDEST
  • [84] PUSH1 0x40
  • [85] MLOAD
  • [86] SWAP1
  • [87] DUP2
  • [88] MSTORE
  • [89] PUSH1 0x20
  • [90] ADD
  • [91] PUSH1 0x40
  • [92] MLOAD
  • [93] DUP1
  • [94] SWAP2
  • [95] SUB
  • [96] SWAP1
  • [97] RETURN
  • [98] JUMPDEST
  • [99] CALLVALUE
  • [100] DUP1
  • [101] ISZERO
  • [102] PUSH2 0x00a5
  • [103] JUMPI
  • [104] PUSH1 0x00
  • [105] DUP1
  • [106] REVERT
  • [107] JUMPDEST
  • [108] POP
  • [109] PUSH2 0x006f
  • [110] PUSH2 0x00c3
  • [111] JUMP
  • [112] JUMPDEST
  • [113] CALLVALUE
  • [114] DUP1
  • [115] ISZERO
  • [116] PUSH2 0x00ba
  • [117] JUMPI
  • [118] PUSH1 0x00
  • [119] DUP1
  • [120] REVERT
  • [121] JUMPDEST
  • [122] POP
  • [123] PUSH2 0x006f
  • [124] PUSH2 0x012d
  • [125] JUMP
  • [126] JUMPDEST
  • [127] PUSH1 0x01
  • [128] PUSH1 0x00
  • [129] SWAP1
  • [130] SLOAD
  • [131] SWAP1
  • [132] PUSH2 0x0100
  • [133] EXP
  • [134] SWAP1
  • [135] DIV
  • [136] PUSH1 0x01
  • [137] PUSH1 0x01
  • [138] PUSH1 0xa0
  • [139] SHL
  • [140] SUB
  • [141] AND
  • [142] PUSH1 0x01
  • [143] PUSH1 0x01
  • [144] PUSH1 0xa0
  • [145] SHL
  • [146] SUB
  • [147] AND
  • [148] PUSH4 0x7114177a
  • [149] PUSH1 0x40
  • [150] MLOAD
  • [151] DUP2
  • [152] PUSH4 0xffffffff
  • [153] AND
  • [154] PUSH1 0xe0
  • [155] SHL
  • [156] DUP2
  • [157] MSTORE
  • [158] PUSH1 0x04
  • [159] ADD
  • [160] PUSH1 0x00
  • [161] PUSH1 0x40
  • [162] MLOAD
  • [163] DUP1
  • [164] DUP4
  • [165] SUB
  • [166] DUP2
  • [167] PUSH1 0x00
  • [168] DUP8
  • [169] DUP1
  • [170] EXTCODESIZE
  • [171] ISZERO
  • [172] DUP1
  • [173] ISZERO
  • [174] PUSH2 0x0113
  • [175] JUMPI
  • [176] PUSH1 0x00
  • [177] DUP1
  • [178] REVERT
  • [179] JUMPDEST
  • [180] POP
  • [181] GAS
  • [182] CALL
  • [183] ISZERO
  • [184] DUP1
  • [185] ISZERO
  • [186] PUSH2 0x0127
  • [187] JUMPI
  • [188] RETURNDATASIZE
  • [189] PUSH1 0x00
  • [190] DUP1
  • [191] RETURNDATACOPY
  • [192] RETURNDATASIZE
  • [193] PUSH1 0x00
  • [194] REVERT
  • [195] JUMPDEST
  • [196] POP
  • [197] POP
  • [198] POP
  • [199] POP
  • [200] JUMP
  • [201] JUMPDEST
  • [202] PUSH1 0x00
  • [203] DUP1
  • [204] SLOAD
  • [205] SWAP1
  • [206] DUP1
  • [207] PUSH2 0x013c
  • [208] DUP4
  • [209] PUSH2 0x015c
  • [210] JUMP
  • [211] JUMPDEST
  • [212] SWAP2
  • [213] SWAP1
  • [214] POP
  • [215] SSTORE
  • [216] POP
  • [217] JUMP
  • [218] JUMPDEST
  • [219] PUSH1 0x00
  • [220] PUSH1 0x20
  • [221] DUP3
  • [222] DUP5
  • [223] SUB
  • [224] SLT
  • [225] ISZERO
  • [226] PUSH2 0x0155
  • [227] JUMPI
  • [228] PUSH1 0x00
  • [229] DUP1
  • [230] REVERT
  • [231] JUMPDEST
  • [232] POP
  • [233] CALLDATALOAD
  • [234] SWAP2
  • [235] SWAP1
  • [236] POP
  • [237] JUMP
  • [238] JUMPDEST
  • [239] PUSH1 0x00
  • [240] PUSH1 0x01
  • [241] DUP3
  • [242] ADD
  • [243] PUSH2 0x017c
  • [244] JUMPI
  • [245] PUSH4 0x4e487b71
  • [246] PUSH1 0xe0
  • [247] SHL
  • [248] PUSH1 0x00
  • [249] MSTORE
  • [250] PUSH1 0x11
  • [251] PUSH1 0x04
  • [252] MSTORE
  • [253] PUSH1 0x24
  • [254] PUSH1 0x00
  • [255] REVERT
  • [256] JUMPDEST
  • [257] POP
  • [258] PUSH1 0x01
  • [259] ADD
  • [260] SWAP1
  • [261] JUMP
  • [262] 'fe'(Unknown Opcode)
  • [263] LOG2
  • [264] PUSH5 0x6970667358
  • [265] '22'(Unknown Opcode)
  • [266] SLT
  • [267] SHA3
  • [268] PUSH9 0xbac50023c2e5733771
  • [269] 'de'(Unknown Opcode)
  • [270] 'd1'(Unknown Opcode)
  • [271] SWAP10
  • [272] 'be'(Unknown Opcode)
  • [273] 'b6'(Unknown Opcode)
  • [274] 'df'(Unknown Opcode)
  • [275] SGT
  • [276] 'bf'(Unknown Opcode)
  • [277] PUSH5 0x147aaf5fb4
  • [278] 'b2'(Unknown Opcode)
  • [279] SHA3