Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x04
  • [4] CALLDATASIZE
  • [5] LT
  • [6] PUSH2 0x001e
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] CALLDATALOAD
  • [10] PUSH1 0xe0
  • [11] SHR
  • [12] DUP1
  • [13] PUSH4 0x8d80ff0a
  • [14] EQ
  • [15] PUSH2 0x0023
  • [16] JUMPI
  • [17] JUMPDEST
  • [18] PUSH1 0x00
  • [19] DUP1
  • [20] REVERT
  • [21] JUMPDEST
  • [22] PUSH2 0x00dc
  • [23] PUSH1 0x04
  • [24] DUP1
  • [25] CALLDATASIZE
  • [26] SUB
  • [27] PUSH1 0x20
  • [28] DUP2
  • [29] LT
  • [30] ISZERO
  • [31] PUSH2 0x0039
  • [32] JUMPI
  • [33] PUSH1 0x00
  • [34] DUP1
  • [35] REVERT
  • [36] JUMPDEST
  • [37] DUP2
  • [38] ADD
  • [39] SWAP1
  • [40] DUP1
  • [41] DUP1
  • [42] CALLDATALOAD
  • [43] SWAP1
  • [44] PUSH1 0x20
  • [45] ADD
  • [46] SWAP1
  • [47] PUSH5 0x0100000000
  • [48] DUP2
  • [49] GT
  • [50] ISZERO
  • [51] PUSH2 0x0056
  • [52] JUMPI
  • [53] PUSH1 0x00
  • [54] DUP1
  • [55] REVERT
  • [56] JUMPDEST
  • [57] DUP3
  • [58] ADD
  • [59] DUP4
  • [60] PUSH1 0x20
  • [61] DUP3
  • [62] ADD
  • [63] GT
  • [64] ISZERO
  • [65] PUSH2 0x0068
  • [66] JUMPI
  • [67] PUSH1 0x00
  • [68] DUP1
  • [69] REVERT
  • [70] JUMPDEST
  • [71] DUP1
  • [72] CALLDATALOAD
  • [73] SWAP1
  • [74] PUSH1 0x20
  • [75] ADD
  • [76] SWAP2
  • [77] DUP5
  • [78] PUSH1 0x01
  • [79] DUP4
  • [80] MUL
  • [81] DUP5
  • [82] ADD
  • [83] GT
  • [84] PUSH5 0x0100000000
  • [85] DUP4
  • [86] GT
  • [87] OR
  • [88] ISZERO
  • [89] PUSH2 0x008a
  • [90] JUMPI
  • [91] PUSH1 0x00
  • [92] DUP1
  • [93] REVERT
  • [94] JUMPDEST
  • [95] SWAP2
  • [96] SWAP1
  • [97] DUP1
  • [98] DUP1
  • [99] PUSH1 0x1f
  • [100] ADD
  • [101] PUSH1 0x20
  • [102] DUP1
  • [103] SWAP2
  • [104] DIV
  • [105] MUL
  • [106] PUSH1 0x20
  • [107] ADD
  • [108] PUSH1 0x40
  • [109] MLOAD
  • [110] SWAP1
  • [111] DUP2
  • [112] ADD
  • [113] PUSH1 0x40
  • [114] MSTORE
  • [115] DUP1
  • [116] SWAP4
  • [117] SWAP3
  • [118] SWAP2
  • [119] SWAP1
  • [120] DUP2
  • [121] DUP2
  • [122] MSTORE
  • [123] PUSH1 0x20
  • [124] ADD
  • [125] DUP4
  • [126] DUP4
  • [127] DUP1
  • [128] DUP3
  • [129] DUP5
  • [130] CALLDATACOPY
  • [131] PUSH1 0x00
  • [132] DUP2
  • [133] DUP5
  • [134] ADD
  • [135] MSTORE
  • [136] PUSH1 0x1f
  • [137] NOT
  • [138] PUSH1 0x1f
  • [139] DUP3
  • [140] ADD
  • [141] AND
  • [142] SWAP1
  • [143] POP
  • [144] DUP1
  • [145] DUP4
  • [146] ADD
  • [147] SWAP3
  • [148] POP
  • [149] POP
  • [150] POP
  • [151] POP
  • [152] POP
  • [153] POP
  • [154] POP
  • [155] SWAP2
  • [156] SWAP3
  • [157] SWAP2
  • [158] SWAP3
  • [159] SWAP1
  • [160] POP
  • [161] POP
  • [162] POP
  • [163] PUSH2 0x00de
  • [164] JUMP
  • [165] JUMPDEST
  • [166] STOP
  • [167] JUMPDEST
  • [168] DUP1
  • [169] MLOAD
  • [170] PUSH1 0x20
  • [171] JUMPDEST
  • [172] DUP2
  • [173] DUP2
  • [174] LT
  • [175] ISZERO
  • [176] PUSH2 0x015f
  • [177] JUMPI
  • [178] DUP1
  • [179] DUP4
  • [180] ADD
  • [181] MLOAD
  • [182] PUSH1 0xf8
  • [183] SHR
  • [184] PUSH1 0x01
  • [185] DUP3
  • [186] ADD
  • [187] DUP5
  • [188] ADD
  • [189] MLOAD
  • [190] PUSH1 0x60
  • [191] SHR
  • [192] PUSH1 0x15
  • [193] DUP4
  • [194] ADD
  • [195] DUP6
  • [196] ADD
  • [197] MLOAD
  • [198] PUSH1 0x35
  • [199] DUP5
  • [200] ADD
  • [201] DUP7
  • [202] ADD
  • [203] MLOAD
  • [204] PUSH1 0x55
  • [205] DUP6
  • [206] ADD
  • [207] DUP8
  • [208] ADD
  • [209] PUSH1 0x00
  • [210] DUP6
  • [211] PUSH1 0x00
  • [212] DUP2
  • [213] EQ
  • [214] PUSH2 0x0128
  • [215] JUMPI
  • [216] PUSH1 0x01
  • [217] DUP2
  • [218] EQ
  • [219] PUSH2 0x0138
  • [220] JUMPI
  • [221] PUSH2 0x013d
  • [222] JUMP
  • [223] JUMPDEST
  • [224] PUSH1 0x00
  • [225] DUP1
  • [226] DUP6
  • [227] DUP6
  • [228] DUP9
  • [229] DUP11
  • [230] GAS
  • [231] CALL
  • [232] SWAP2
  • [233] POP
  • [234] PUSH2 0x013d
  • [235] JUMP
  • [236] JUMPDEST
  • [237] PUSH1 0x00
  • [238] DUP1
  • [239] REVERT
  • [240] JUMPDEST
  • [241] POP
  • [242] PUSH1 0x00
  • [243] DUP2
  • [244] EQ
  • [245] ISZERO
  • [246] PUSH2 0x014c
  • [247] JUMPI
  • [248] PUSH1 0x00
  • [249] DUP1
  • [250] REVERT
  • [251] JUMPDEST
  • [252] DUP3
  • [253] PUSH1 0x55
  • [254] ADD
  • [255] DUP8
  • [256] ADD
  • [257] SWAP7
  • [258] POP
  • [259] POP
  • [260] POP
  • [261] POP
  • [262] POP
  • [263] POP
  • [264] POP
  • [265] PUSH2 0x00e3
  • [266] JUMP
  • [267] JUMPDEST
  • [268] POP
  • [269] POP
  • [270] POP
  • [271] JUMP
  • [272] 'fe'(Unknown Opcode)
  • [273] LOG2
  • [274] PUSH5 0x6970667358
  • [275] '22'(Unknown Opcode)
  • [276] SLT
  • [277] SHA3
  • [278] CALLDATALOAD
  • [279] '24'(Unknown Opcode)
  • [280] PUSH5 0x02746c9696
  • [281] DIFFICULTY
  • [282] SWAP6
  • [283] 'ca'(Unknown Opcode)
  • [284] 'e5'(Unknown Opcode)
  • [285] 'b3'(Unknown Opcode)
  • [286] PUSH5 0x61fd44dfb8
  • [287] SWAP16
  • [288] DUP15
  • [289] PUSH13 0xf6f6b8d60c0aa89f414864736f