Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0034
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x893d20e8
  • [24] EQ
  • [25] PUSH2 0x0038
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0xa6f9dae1
  • [29] EQ
  • [30] PUSH2 0x0056
  • [31] JUMPI
  • [32] JUMPDEST
  • [33] PUSH0 0x
  • [34] DUP1
  • [35] REVERT
  • [36] JUMPDEST
  • [37] PUSH0 0x
  • [38] SLOAD
  • [39] PUSH1 0x40
  • [40] DUP1
  • [41] MLOAD
  • [42] PUSH1 0x01
  • [43] PUSH1 0x01
  • [44] PUSH1 0xa0
  • [45] SHL
  • [46] SUB
  • [47] SWAP1
  • [48] SWAP3
  • [49] AND
  • [50] DUP3
  • [51] MSTORE
  • [52] MLOAD
  • [53] SWAP1
  • [54] DUP2
  • [55] SWAP1
  • [56] SUB
  • [57] PUSH1 0x20
  • [58] ADD
  • [59] SWAP1
  • [60] RETURN
  • [61] JUMPDEST
  • [62] PUSH2 0x0069
  • [63] PUSH2 0x0064
  • [64] CALLDATASIZE
  • [65] PUSH1 0x04
  • [66] PUSH2 0x0140
  • [67] JUMP
  • [68] JUMPDEST
  • [69] PUSH2 0x006b
  • [70] JUMP
  • [71] JUMPDEST
  • [72] STOP
  • [73] JUMPDEST
  • [74] PUSH0 0x
  • [75] SLOAD
  • [76] PUSH1 0x01
  • [77] PUSH1 0x01
  • [78] PUSH1 0xa0
  • [79] SHL
  • [80] SUB
  • [81] AND
  • [82] CALLER
  • [83] EQ
  • [84] PUSH2 0x00be
  • [85] JUMPI
  • [86] PUSH1 0x40
  • [87] MLOAD
  • [88] PUSH3 0x461bcd
  • [89] PUSH1 0xe5
  • [90] SHL
  • [91] DUP2
  • [92] MSTORE
  • [93] PUSH1 0x20
  • [94] PUSH1 0x04
  • [95] DUP3
  • [96] ADD
  • [97] MSTORE
  • [98] PUSH1 0x13
  • [99] PUSH1 0x24
  • [100] DUP3
  • [101] ADD
  • [102] MSTORE
  • [103] PUSH19 0x21b0b63632b91034b9903737ba1037bbb732b9
  • [104] PUSH1 0x69
  • [105] SHL
  • [106] PUSH1 0x44
  • [107] DUP3
  • [108] ADD
  • [109] MSTORE
  • [110] PUSH1 0x64
  • [111] ADD
  • [112] PUSH1 0x40
  • [113] MLOAD
  • [114] DUP1
  • [115] SWAP2
  • [116] SUB
  • [117] SWAP1
  • [118] REVERT
  • [119] JUMPDEST
  • [120] PUSH0 0x
  • [121] DUP1
  • [122] SLOAD
  • [123] PUSH1 0x40
  • [124] MLOAD
  • [125] PUSH1 0x01
  • [126] PUSH1 0x01
  • [127] PUSH1 0xa0
  • [128] SHL
  • [129] SUB
  • [130] DUP1
  • [131] DUP6
  • [132] AND
  • [133] SWAP4
  • [134] SWAP3
  • [135] AND
  • [136] SWAP2
  • [137] PUSH32 0x342827c97908e5e2f71151c08502a66d44b6f758e3ac2f1de95f02eb95f0a735
  • [138] SWAP2
  • [139] LOG3
  • [140] PUSH0 0x
  • [141] DUP1
  • [142] SLOAD
  • [143] PUSH1 0x01
  • [144] PUSH1 0x01
  • [145] PUSH1 0xa0
  • [146] SHL
  • [147] SUB
  • [148] NOT
  • [149] AND
  • [150] PUSH1 0x01
  • [151] PUSH1 0x01
  • [152] PUSH1 0xa0
  • [153] SHL
  • [154] SUB
  • [155] SWAP3
  • [156] SWAP1
  • [157] SWAP3
  • [158] AND
  • [159] SWAP2
  • [160] SWAP1
  • [161] SWAP2
  • [162] OR
  • [163] SWAP1
  • [164] SSTORE
  • [165] JUMP
  • [166] JUMPDEST
  • [167] PUSH0 0x
  • [168] PUSH11 0x636f6e736f6c652e6c6f67
  • [169] SWAP1
  • [170] POP
  • [171] PUSH0 0x
  • [172] DUP1
  • [173] DUP4
  • [174] MLOAD
  • [175] PUSH1 0x20
  • [176] DUP6
  • [177] ADD
  • [178] DUP5
  • [179] GAS
  • [180] STATICCALL
  • [181] POP
  • [182] POP
  • [183] POP
  • [184] JUMP
  • [185] JUMPDEST
  • [186] PUSH2 0x013e
  • [187] PUSH2 0x016d
  • [188] JUMP
  • [189] JUMPDEST
  • [190] JUMP
  • [191] JUMPDEST
  • [192] PUSH0 0x
  • [193] PUSH1 0x20
  • [194] DUP3
  • [195] DUP5
  • [196] SUB
  • [197] SLT
  • [198] ISZERO
  • [199] PUSH2 0x0150
  • [200] JUMPI
  • [201] PUSH0 0x
  • [202] DUP1
  • [203] REVERT
  • [204] JUMPDEST
  • [205] DUP2
  • [206] CALLDATALOAD
  • [207] PUSH1 0x01
  • [208] PUSH1 0x01
  • [209] PUSH1 0xa0
  • [210] SHL
  • [211] SUB
  • [212] DUP2
  • [213] AND
  • [214] DUP2
  • [215] EQ
  • [216] PUSH2 0x0166
  • [217] JUMPI
  • [218] PUSH0 0x
  • [219] DUP1
  • [220] REVERT
  • [221] JUMPDEST
  • [222] SWAP4
  • [223] SWAP3
  • [224] POP
  • [225] POP
  • [226] POP
  • [227] JUMP
  • [228] JUMPDEST
  • [229] PUSH4 0x4e487b71
  • [230] PUSH1 0xe0
  • [231] SHL
  • [232] PUSH0 0x
  • [233] MSTORE
  • [234] PUSH1 0x51
  • [235] PUSH1 0x04
  • [236] MSTORE
  • [237] PUSH1 0x24
  • [238] PUSH0 0x
  • [239] REVERT
  • [240] 'fe'(Unknown Opcode)
  • [241] LOG2
  • [242] PUSH5 0x6970667358
  • [243] '22'(Unknown Opcode)
  • [244] SLT
  • [245] SHA3
  • [246] MSIZE
  • [247] 'e6'(Unknown Opcode)
  • [248] MUL
  • [249] 'a7'(Unknown Opcode)
  • [250] 'ea'(Unknown Opcode)
  • [251] STATICCALL
  • [252] 'eb'(Unknown Opcode)
  • [253] MSTORE
  • [254] 'd4'(Unknown Opcode)
  • [255] SWAP11
  • [256] SWAP2
  • [257] '1e'(Unknown Opcode)
  • [258] CALLER
  • [259] SHA3
  • [260] GASLIMIT
  • [261] DIV
  • [262] CODECOPY
  • [263] '2d'(Unknown Opcode)
  • [264] DELEGATECALL
  • [265] 'dc'(Unknown Opcode)
  • [266] PUSH23 0x2d10b69b802c05f548910364736f6c634300081a0033