Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x007b
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x56eb4608
  • [24] GT
  • [25] PUSH2 0x0059
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0x56eb4608
  • [29] EQ
  • [30] PUSH2 0x00d3
  • [31] JUMPI
  • [32] DUP1
  • [33] PUSH4 0x87465aea
  • [34] EQ
  • [35] PUSH2 0x00ef
  • [36] JUMPI
  • [37] DUP1
  • [38] PUSH4 0xf2c59801
  • [39] EQ
  • [40] PUSH2 0x010d
  • [41] JUMPI
  • [42] DUP1
  • [43] PUSH4 0xfbf738fd
  • [44] EQ
  • [45] PUSH2 0x0129
  • [46] JUMPI
  • [47] PUSH2 0x007b
  • [48] JUMP
  • [49] JUMPDEST
  • [50] DUP1
  • [51] PUSH4 0x144ec63a
  • [52] EQ
  • [53] PUSH2 0x007f
  • [54] JUMPI
  • [55] DUP1
  • [56] PUSH4 0x2a32d6d1
  • [57] EQ
  • [58] PUSH2 0x009b
  • [59] JUMPI
  • [60] DUP1
  • [61] PUSH4 0x2d7beb96
  • [62] EQ
  • [63] PUSH2 0x00b7
  • [64] JUMPI
  • [65] JUMPDEST
  • [66] PUSH0 0x
  • [67] DUP1
  • [68] REVERT
  • [69] JUMPDEST
  • [70] PUSH2 0x0099
  • [71] PUSH1 0x04
  • [72] DUP1
  • [73] CALLDATASIZE
  • [74] SUB
  • [75] DUP2
  • [76] ADD
  • [77] SWAP1
  • [78] PUSH2 0x0094
  • [79] SWAP2
  • [80] SWAP1
  • [81] PUSH2 0x01c0
  • [82] JUMP
  • [83] JUMPDEST
  • [84] PUSH2 0x0145
  • [85] JUMP
  • [86] JUMPDEST
  • [87] STOP
  • [88] JUMPDEST
  • [89] PUSH2 0x00b5
  • [90] PUSH1 0x04
  • [91] DUP1
  • [92] CALLDATASIZE
  • [93] SUB
  • [94] DUP2
  • [95] ADD
  • [96] SWAP1
  • [97] PUSH2 0x00b0
  • [98] SWAP2
  • [99] SWAP1
  • [100] PUSH2 0x01c0
  • [101] JUMP
  • [102] JUMPDEST
  • [103] PUSH2 0x014f
  • [104] JUMP
  • [105] JUMPDEST
  • [106] STOP
  • [107] JUMPDEST
  • [108] PUSH2 0x00d1
  • [109] PUSH1 0x04
  • [110] DUP1
  • [111] CALLDATASIZE
  • [112] SUB
  • [113] DUP2
  • [114] ADD
  • [115] SWAP1
  • [116] PUSH2 0x00cc
  • [117] SWAP2
  • [118] SWAP1
  • [119] PUSH2 0x01c0
  • [120] JUMP
  • [121] JUMPDEST
  • [122] PUSH2 0x0159
  • [123] JUMP
  • [124] JUMPDEST
  • [125] STOP
  • [126] JUMPDEST
  • [127] PUSH2 0x00ed
  • [128] PUSH1 0x04
  • [129] DUP1
  • [130] CALLDATASIZE
  • [131] SUB
  • [132] DUP2
  • [133] ADD
  • [134] SWAP1
  • [135] PUSH2 0x00e8
  • [136] SWAP2
  • [137] SWAP1
  • [138] PUSH2 0x01c0
  • [139] JUMP
  • [140] JUMPDEST
  • [141] PUSH2 0x0163
  • [142] JUMP
  • [143] JUMPDEST
  • [144] STOP
  • [145] JUMPDEST
  • [146] PUSH2 0x00f7
  • [147] PUSH2 0x016d
  • [148] JUMP
  • [149] JUMPDEST
  • [150] PUSH1 0x40
  • [151] MLOAD
  • [152] PUSH2 0x0104
  • [153] SWAP2
  • [154] SWAP1
  • [155] PUSH2 0x01fa
  • [156] JUMP
  • [157] JUMPDEST
  • [158] PUSH1 0x40
  • [159] MLOAD
  • [160] DUP1
  • [161] SWAP2
  • [162] SUB
  • [163] SWAP1
  • [164] RETURN
  • [165] JUMPDEST
  • [166] PUSH2 0x0127
  • [167] PUSH1 0x04
  • [168] DUP1
  • [169] CALLDATASIZE
  • [170] SUB
  • [171] DUP2
  • [172] ADD
  • [173] SWAP1
  • [174] PUSH2 0x0122
  • [175] SWAP2
  • [176] SWAP1
  • [177] PUSH2 0x01c0
  • [178] JUMP
  • [179] JUMPDEST
  • [180] PUSH2 0x0175
  • [181] JUMP
  • [182] JUMPDEST
  • [183] STOP
  • [184] JUMPDEST
  • [185] PUSH2 0x0143
  • [186] PUSH1 0x04
  • [187] DUP1
  • [188] CALLDATASIZE
  • [189] SUB
  • [190] DUP2
  • [191] ADD
  • [192] SWAP1
  • [193] PUSH2 0x013e
  • [194] SWAP2
  • [195] SWAP1
  • [196] PUSH2 0x01c0
  • [197] JUMP
  • [198] JUMPDEST
  • [199] PUSH2 0x017f
  • [200] JUMP
  • [201] JUMPDEST
  • [202] STOP
  • [203] JUMPDEST
  • [204] DUP1
  • [205] PUSH1 0x04
  • [206] DUP2
  • [207] SWAP1
  • [208] SSTORE
  • [209] POP
  • [210] POP
  • [211] JUMP
  • [212] JUMPDEST
  • [213] DUP1
  • [214] PUSH1 0x05
  • [215] DUP2
  • [216] SWAP1
  • [217] SSTORE
  • [218] POP
  • [219] POP
  • [220] JUMP
  • [221] JUMPDEST
  • [222] DUP1
  • [223] PUSH1 0x02
  • [224] DUP2
  • [225] SWAP1
  • [226] SSTORE
  • [227] POP
  • [228] POP
  • [229] JUMP
  • [230] JUMPDEST
  • [231] DUP1
  • [232] PUSH1 0x06
  • [233] DUP2
  • [234] SWAP1
  • [235] SSTORE
  • [236] POP
  • [237] POP
  • [238] JUMP
  • [239] JUMPDEST
  • [240] PUSH0 0x
  • [241] DUP1
  • [242] SLOAD
  • [243] SWAP1
  • [244] POP
  • [245] SWAP1
  • [246] JUMP
  • [247] JUMPDEST
  • [248] DUP1
  • [249] PUSH1 0x03
  • [250] DUP2
  • [251] SWAP1
  • [252] SSTORE
  • [253] POP
  • [254] POP
  • [255] JUMP
  • [256] JUMPDEST
  • [257] DUP1
  • [258] PUSH1 0x01
  • [259] DUP2
  • [260] SWAP1
  • [261] SSTORE
  • [262] POP
  • [263] POP
  • [264] JUMP
  • [265] JUMPDEST
  • [266] PUSH0 0x
  • [267] DUP1
  • [268] REVERT
  • [269] JUMPDEST
  • [270] PUSH0 0x
  • [271] DUP2
  • [272] SWAP1
  • [273] POP
  • [274] SWAP2
  • [275] SWAP1
  • [276] POP
  • [277] JUMP
  • [278] JUMPDEST
  • [279] PUSH2 0x019f
  • [280] DUP2
  • [281] PUSH2 0x018d
  • [282] JUMP
  • [283] JUMPDEST
  • [284] DUP2
  • [285] EQ
  • [286] PUSH2 0x01a9
  • [287] JUMPI
  • [288] PUSH0 0x
  • [289] DUP1
  • [290] REVERT
  • [291] JUMPDEST
  • [292] POP
  • [293] JUMP
  • [294] JUMPDEST
  • [295] PUSH0 0x
  • [296] DUP2
  • [297] CALLDATALOAD
  • [298] SWAP1
  • [299] POP
  • [300] PUSH2 0x01ba
  • [301] DUP2
  • [302] PUSH2 0x0196
  • [303] JUMP
  • [304] JUMPDEST
  • [305] SWAP3
  • [306] SWAP2
  • [307] POP
  • [308] POP
  • [309] JUMP
  • [310] JUMPDEST
  • [311] PUSH0 0x
  • [312] PUSH1 0x20
  • [313] DUP3
  • [314] DUP5
  • [315] SUB
  • [316] SLT
  • [317] ISZERO
  • [318] PUSH2 0x01d5
  • [319] JUMPI
  • [320] PUSH2 0x01d4
  • [321] PUSH2 0x0189
  • [322] JUMP
  • [323] JUMPDEST
  • [324] JUMPDEST
  • [325] PUSH0 0x
  • [326] PUSH2 0x01e2
  • [327] DUP5
  • [328] DUP3
  • [329] DUP6
  • [330] ADD
  • [331] PUSH2 0x01ac
  • [332] JUMP
  • [333] JUMPDEST
  • [334] SWAP2
  • [335] POP
  • [336] POP
  • [337] SWAP3
  • [338] SWAP2
  • [339] POP
  • [340] POP
  • [341] JUMP
  • [342] JUMPDEST
  • [343] PUSH2 0x01f4
  • [344] DUP2
  • [345] PUSH2 0x018d
  • [346] JUMP
  • [347] JUMPDEST
  • [348] DUP3
  • [349] MSTORE
  • [350] POP
  • [351] POP
  • [352] JUMP
  • [353] JUMPDEST
  • [354] PUSH0 0x
  • [355] PUSH1 0x20
  • [356] DUP3
  • [357] ADD
  • [358] SWAP1
  • [359] POP
  • [360] PUSH2 0x020d
  • [361] PUSH0 0x
  • [362] DUP4
  • [363] ADD
  • [364] DUP5
  • [365] PUSH2 0x01eb
  • [366] JUMP
  • [367] JUMPDEST
  • [368] SWAP3
  • [369] SWAP2
  • [370] POP
  • [371] POP
  • [372] JUMP
  • [373] 'fe'(Unknown Opcode)
  • [374] LOG2
  • [375] PUSH5 0x6970667358
  • [376] '22'(Unknown Opcode)
  • [377] SLT
  • [378] SHA3
  • [379] DUP9
  • [380] CODECOPY
  • [381] 'eb'(Unknown Opcode)
  • [382] PUSH2 0x605a
  • [383] JUMPI
  • [384] SUB
  • [385] 'e8'(Unknown Opcode)
  • [386] 'b2'(Unknown Opcode)
  • [387] PUSH22 0xcb01f0001bfca0fe3fee426dd85342f842ab071da564