Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLVALUE
- [4] DUP1
- [5] ISZERO
- [6] PUSH2 0x000f
- [7] JUMPI
- [8] PUSH0 0x
- [9] DUP1
- [10] REVERT
- [11] JUMPDEST
- [12] POP
- [13] PUSH1 0x04
- [14] CALLDATASIZE
- [15] LT
- [16] PUSH2 0x007b
- [17] JUMPI
- [18] PUSH0 0x
- [19] CALLDATALOAD
- [20] PUSH1 0xe0
- [21] SHR
- [22] DUP1
- [23] PUSH4 0x56eb4608
- [24] GT
- [25] PUSH2 0x0059
- [26] JUMPI
- [27] DUP1
- [28] PUSH4 0x56eb4608
- [29] EQ
- [30] PUSH2 0x00d3
- [31] JUMPI
- [32] DUP1
- [33] PUSH4 0x87465aea
- [34] EQ
- [35] PUSH2 0x00ef
- [36] JUMPI
- [37] DUP1
- [38] PUSH4 0xf2c59801
- [39] EQ
- [40] PUSH2 0x010d
- [41] JUMPI
- [42] DUP1
- [43] PUSH4 0xfbf738fd
- [44] EQ
- [45] PUSH2 0x0129
- [46] JUMPI
- [47] PUSH2 0x007b
- [48] JUMP
- [49] JUMPDEST
- [50] DUP1
- [51] PUSH4 0x144ec63a
- [52] EQ
- [53] PUSH2 0x007f
- [54] JUMPI
- [55] DUP1
- [56] PUSH4 0x2a32d6d1
- [57] EQ
- [58] PUSH2 0x009b
- [59] JUMPI
- [60] DUP1
- [61] PUSH4 0x2d7beb96
- [62] EQ
- [63] PUSH2 0x00b7
- [64] JUMPI
- [65] JUMPDEST
- [66] PUSH0 0x
- [67] DUP1
- [68] REVERT
- [69] JUMPDEST
- [70] PUSH2 0x0099
- [71] PUSH1 0x04
- [72] DUP1
- [73] CALLDATASIZE
- [74] SUB
- [75] DUP2
- [76] ADD
- [77] SWAP1
- [78] PUSH2 0x0094
- [79] SWAP2
- [80] SWAP1
- [81] PUSH2 0x01c0
- [82] JUMP
- [83] JUMPDEST
- [84] PUSH2 0x0145
- [85] JUMP
- [86] JUMPDEST
- [87] STOP
- [88] JUMPDEST
- [89] PUSH2 0x00b5
- [90] PUSH1 0x04
- [91] DUP1
- [92] CALLDATASIZE
- [93] SUB
- [94] DUP2
- [95] ADD
- [96] SWAP1
- [97] PUSH2 0x00b0
- [98] SWAP2
- [99] SWAP1
- [100] PUSH2 0x01c0
- [101] JUMP
- [102] JUMPDEST
- [103] PUSH2 0x014f
- [104] JUMP
- [105] JUMPDEST
- [106] STOP
- [107] JUMPDEST
- [108] PUSH2 0x00d1
- [109] PUSH1 0x04
- [110] DUP1
- [111] CALLDATASIZE
- [112] SUB
- [113] DUP2
- [114] ADD
- [115] SWAP1
- [116] PUSH2 0x00cc
- [117] SWAP2
- [118] SWAP1
- [119] PUSH2 0x01c0
- [120] JUMP
- [121] JUMPDEST
- [122] PUSH2 0x0159
- [123] JUMP
- [124] JUMPDEST
- [125] STOP
- [126] JUMPDEST
- [127] PUSH2 0x00ed
- [128] PUSH1 0x04
- [129] DUP1
- [130] CALLDATASIZE
- [131] SUB
- [132] DUP2
- [133] ADD
- [134] SWAP1
- [135] PUSH2 0x00e8
- [136] SWAP2
- [137] SWAP1
- [138] PUSH2 0x01c0
- [139] JUMP
- [140] JUMPDEST
- [141] PUSH2 0x0163
- [142] JUMP
- [143] JUMPDEST
- [144] STOP
- [145] JUMPDEST
- [146] PUSH2 0x00f7
- [147] PUSH2 0x016d
- [148] JUMP
- [149] JUMPDEST
- [150] PUSH1 0x40
- [151] MLOAD
- [152] PUSH2 0x0104
- [153] SWAP2
- [154] SWAP1
- [155] PUSH2 0x01fa
- [156] JUMP
- [157] JUMPDEST
- [158] PUSH1 0x40
- [159] MLOAD
- [160] DUP1
- [161] SWAP2
- [162] SUB
- [163] SWAP1
- [164] RETURN
- [165] JUMPDEST
- [166] PUSH2 0x0127
- [167] PUSH1 0x04
- [168] DUP1
- [169] CALLDATASIZE
- [170] SUB
- [171] DUP2
- [172] ADD
- [173] SWAP1
- [174] PUSH2 0x0122
- [175] SWAP2
- [176] SWAP1
- [177] PUSH2 0x01c0
- [178] JUMP
- [179] JUMPDEST
- [180] PUSH2 0x0175
- [181] JUMP
- [182] JUMPDEST
- [183] STOP
- [184] JUMPDEST
- [185] PUSH2 0x0143
- [186] PUSH1 0x04
- [187] DUP1
- [188] CALLDATASIZE
- [189] SUB
- [190] DUP2
- [191] ADD
- [192] SWAP1
- [193] PUSH2 0x013e
- [194] SWAP2
- [195] SWAP1
- [196] PUSH2 0x01c0
- [197] JUMP
- [198] JUMPDEST
- [199] PUSH2 0x017f
- [200] JUMP
- [201] JUMPDEST
- [202] STOP
- [203] JUMPDEST
- [204] DUP1
- [205] PUSH1 0x04
- [206] DUP2
- [207] SWAP1
- [208] SSTORE
- [209] POP
- [210] POP
- [211] JUMP
- [212] JUMPDEST
- [213] DUP1
- [214] PUSH1 0x05
- [215] DUP2
- [216] SWAP1
- [217] SSTORE
- [218] POP
- [219] POP
- [220] JUMP
- [221] JUMPDEST
- [222] DUP1
- [223] PUSH1 0x02
- [224] DUP2
- [225] SWAP1
- [226] SSTORE
- [227] POP
- [228] POP
- [229] JUMP
- [230] JUMPDEST
- [231] DUP1
- [232] PUSH1 0x06
- [233] DUP2
- [234] SWAP1
- [235] SSTORE
- [236] POP
- [237] POP
- [238] JUMP
- [239] JUMPDEST
- [240] PUSH0 0x
- [241] DUP1
- [242] SLOAD
- [243] SWAP1
- [244] POP
- [245] SWAP1
- [246] JUMP
- [247] JUMPDEST
- [248] DUP1
- [249] PUSH1 0x03
- [250] DUP2
- [251] SWAP1
- [252] SSTORE
- [253] POP
- [254] POP
- [255] JUMP
- [256] JUMPDEST
- [257] DUP1
- [258] PUSH1 0x01
- [259] DUP2
- [260] SWAP1
- [261] SSTORE
- [262] POP
- [263] POP
- [264] JUMP
- [265] JUMPDEST
- [266] PUSH0 0x
- [267] DUP1
- [268] REVERT
- [269] JUMPDEST
- [270] PUSH0 0x
- [271] DUP2
- [272] SWAP1
- [273] POP
- [274] SWAP2
- [275] SWAP1
- [276] POP
- [277] JUMP
- [278] JUMPDEST
- [279] PUSH2 0x019f
- [280] DUP2
- [281] PUSH2 0x018d
- [282] JUMP
- [283] JUMPDEST
- [284] DUP2
- [285] EQ
- [286] PUSH2 0x01a9
- [287] JUMPI
- [288] PUSH0 0x
- [289] DUP1
- [290] REVERT
- [291] JUMPDEST
- [292] POP
- [293] JUMP
- [294] JUMPDEST
- [295] PUSH0 0x
- [296] DUP2
- [297] CALLDATALOAD
- [298] SWAP1
- [299] POP
- [300] PUSH2 0x01ba
- [301] DUP2
- [302] PUSH2 0x0196
- [303] JUMP
- [304] JUMPDEST
- [305] SWAP3
- [306] SWAP2
- [307] POP
- [308] POP
- [309] JUMP
- [310] JUMPDEST
- [311] PUSH0 0x
- [312] PUSH1 0x20
- [313] DUP3
- [314] DUP5
- [315] SUB
- [316] SLT
- [317] ISZERO
- [318] PUSH2 0x01d5
- [319] JUMPI
- [320] PUSH2 0x01d4
- [321] PUSH2 0x0189
- [322] JUMP
- [323] JUMPDEST
- [324] JUMPDEST
- [325] PUSH0 0x
- [326] PUSH2 0x01e2
- [327] DUP5
- [328] DUP3
- [329] DUP6
- [330] ADD
- [331] PUSH2 0x01ac
- [332] JUMP
- [333] JUMPDEST
- [334] SWAP2
- [335] POP
- [336] POP
- [337] SWAP3
- [338] SWAP2
- [339] POP
- [340] POP
- [341] JUMP
- [342] JUMPDEST
- [343] PUSH2 0x01f4
- [344] DUP2
- [345] PUSH2 0x018d
- [346] JUMP
- [347] JUMPDEST
- [348] DUP3
- [349] MSTORE
- [350] POP
- [351] POP
- [352] JUMP
- [353] JUMPDEST
- [354] PUSH0 0x
- [355] PUSH1 0x20
- [356] DUP3
- [357] ADD
- [358] SWAP1
- [359] POP
- [360] PUSH2 0x020d
- [361] PUSH0 0x
- [362] DUP4
- [363] ADD
- [364] DUP5
- [365] PUSH2 0x01eb
- [366] JUMP
- [367] JUMPDEST
- [368] SWAP3
- [369] SWAP2
- [370] POP
- [371] POP
- [372] JUMP
- [373] 'fe'(Unknown Opcode)
- [374] LOG2
- [375] PUSH5 0x6970667358
- [376] '22'(Unknown Opcode)
- [377] SLT
- [378] SHA3
- [379] DUP9
- [380] CODECOPY
- [381] 'eb'(Unknown Opcode)
- [382] PUSH2 0x605a
- [383] JUMPI
- [384] SUB
- [385] 'e8'(Unknown Opcode)
- [386] 'b2'(Unknown Opcode)
- [387] PUSH22 0xcb01f0001bfca0fe3fee426dd85342f842ab071da564