Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] PUSH1 0x04
- [4] CALLDATASIZE
- [5] LT
- [6] PUSH2 0x0022
- [7] JUMPI
- [8] PUSH1 0x00
- [9] CALLDATALOAD
- [10] PUSH1 0xe0
- [11] SHR
- [12] DUP1
- [13] PUSH4 0x59659e90
- [14] EQ
- [15] PUSH2 0x0039
- [16] JUMPI
- [17] PUSH2 0x0031
- [18] JUMP
- [19] JUMPDEST
- [20] CALLDATASIZE
- [21] PUSH2 0x0031
- [22] JUMPI
- [23] PUSH2 0x002f
- [24] PUSH2 0x006a
- [25] JUMP
- [26] JUMPDEST
- [27] STOP
- [28] JUMPDEST
- [29] PUSH2 0x002f
- [30] PUSH2 0x006a
- [31] JUMP
- [32] JUMPDEST
- [33] CALLVALUE
- [34] DUP1
- [35] ISZERO
- [36] PUSH2 0x0045
- [37] JUMPI
- [38] PUSH1 0x00
- [39] DUP1
- [40] REVERT
- [41] JUMPDEST
- [42] POP
- [43] PUSH2 0x004e
- [44] PUSH2 0x007c
- [45] JUMP
- [46] JUMPDEST
- [47] PUSH1 0x40
- [48] MLOAD
- [49] PUSH1 0x01
- [50] PUSH1 0x01
- [51] PUSH1 0xa0
- [52] SHL
- [53] SUB
- [54] SWAP1
- [55] SWAP2
- [56] AND
- [57] DUP2
- [58] MSTORE
- [59] PUSH1 0x20
- [60] ADD
- [61] PUSH1 0x40
- [62] MLOAD
- [63] DUP1
- [64] SWAP2
- [65] SUB
- [66] SWAP1
- [67] RETURN
- [68] JUMPDEST
- [69] PUSH2 0x007a
- [70] PUSH2 0x0075
- [71] PUSH2 0x008b
- [72] JUMP
- [73] JUMPDEST
- [74] PUSH2 0x00f6
- [75] JUMP
- [76] JUMPDEST
- [77] JUMP
- [78] JUMPDEST
- [79] PUSH1 0x00
- [80] PUSH2 0x0086
- [81] PUSH2 0x011a
- [82] JUMP
- [83] JUMPDEST
- [84] SWAP1
- [85] POP
- [86] SWAP1
- [87] JUMP
- [88] JUMPDEST
- [89] PUSH1 0x00
- [90] PUSH2 0x0095
- [91] PUSH2 0x011a
- [92] JUMP
- [93] JUMPDEST
- [94] PUSH1 0x01
- [95] PUSH1 0x01
- [96] PUSH1 0xa0
- [97] SHL
- [98] SUB
- [99] AND
- [100] PUSH4 0x5c60da1b
- [101] PUSH1 0x40
- [102] MLOAD
- [103] DUP2
- [104] PUSH4 0xffffffff
- [105] AND
- [106] PUSH1 0xe0
- [107] SHL
- [108] DUP2
- [109] MSTORE
- [110] PUSH1 0x04
- [111] ADD
- [112] PUSH1 0x20
- [113] PUSH1 0x40
- [114] MLOAD
- [115] DUP1
- [116] DUP4
- [117] SUB
- [118] DUP2
- [119] DUP7
- [120] GAS
- [121] STATICCALL
- [122] ISZERO
- [123] DUP1
- [124] ISZERO
- [125] PUSH2 0x00d2
- [126] JUMPI
- [127] RETURNDATASIZE
- [128] PUSH1 0x00
- [129] DUP1
- [130] RETURNDATACOPY
- [131] RETURNDATASIZE
- [132] PUSH1 0x00
- [133] REVERT
- [134] JUMPDEST
- [135] POP
- [136] POP
- [137] POP
- [138] POP
- [139] PUSH1 0x40
- [140] MLOAD
- [141] RETURNDATASIZE
- [142] PUSH1 0x1f
- [143] NOT
- [144] PUSH1 0x1f
- [145] DUP3
- [146] ADD
- [147] AND
- [148] DUP3
- [149] ADD
- [150] DUP1
- [151] PUSH1 0x40
- [152] MSTORE
- [153] POP
- [154] DUP2
- [155] ADD
- [156] SWAP1
- [157] PUSH2 0x0086
- [158] SWAP2
- [159] SWAP1
- [160] PUSH2 0x013e
- [161] JUMP
- [162] JUMPDEST
- [163] CALLDATASIZE
- [164] PUSH1 0x00
- [165] DUP1
- [166] CALLDATACOPY
- [167] PUSH1 0x00
- [168] DUP1
- [169] CALLDATASIZE
- [170] PUSH1 0x00
- [171] DUP5
- [172] GAS
- [173] DELEGATECALL
- [174] RETURNDATASIZE
- [175] PUSH1 0x00
- [176] DUP1
- [177] RETURNDATACOPY
- [178] DUP1
- [179] DUP1
- [180] ISZERO
- [181] PUSH2 0x0115
- [182] JUMPI
- [183] RETURNDATASIZE
- [184] PUSH1 0x00
- [185] RETURN
- [186] JUMPDEST
- [187] RETURNDATASIZE
- [188] PUSH1 0x00
- [189] REVERT
- [190] JUMPDEST
- [191] PUSH32 0x000000000000000000000000042935d0074c39c1f8ed1f41692f7ead85e6e583
- [192] SWAP1
- [193] JUMP
- [194] JUMPDEST
- [195] PUSH1 0x00
- [196] PUSH1 0x20
- [197] DUP3
- [198] DUP5
- [199] SUB
- [200] SLT
- [201] ISZERO
- [202] PUSH2 0x0150
- [203] JUMPI
- [204] PUSH1 0x00
- [205] DUP1
- [206] REVERT
- [207] JUMPDEST
- [208] DUP2
- [209] MLOAD
- [210] PUSH1 0x01
- [211] PUSH1 0x01
- [212] PUSH1 0xa0
- [213] SHL
- [214] SUB
- [215] DUP2
- [216] AND
- [217] DUP2
- [218] EQ
- [219] PUSH2 0x0167
- [220] JUMPI
- [221] PUSH1 0x00
- [222] DUP1
- [223] REVERT
- [224] JUMPDEST
- [225] SWAP4
- [226] SWAP3
- [227] POP
- [228] POP
- [229] POP
- [230] JUMP
- [231] 'fe'(Unknown Opcode)
- [232] LOG2
- [233] PUSH5 0x6970667358
- [234] '22'(Unknown Opcode)
- [235] SLT
- [236] SHA3
- [237] '23'(Unknown Opcode)
- [238] SWAP9
- [239] CALLER
- [240] ADDRESS
- [241] SUB
- [242] PUSH1 0xc7
- [243] '0d'(Unknown Opcode)
- [244] '4c'(Unknown Opcode)
- [245] CHAINID
- [246] CALLDATACOPY
- [247] 'b8'(Unknown Opcode)
- [248] STOP
- [249] OR
- [250] GASPRICE
- [251] JUMPI
- [252] 'ce'(Unknown Opcode)
- [253] ISZERO
- [254] SWAP6
- [255] TSTORE
- [256] SWAP5
- [257] SWAP16
- [258] BYTE
- [259] '2a'(Unknown Opcode)
- [260] CALLDATACOPY
- [261] DUP13
- [262] SLT
- [263] MUL
- [264] '0d'(Unknown Opcode)
- [265] SHR
- [266] EQ
- [267] '0c'(Unknown Opcode)
- [268] PUSH5 0x736f6c6343
- [269] STOP
- [270] ADDMOD
- [271] BYTE
- [272] STOP
- [273] CALLER