Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0029
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x13bdfacd
  • [24] EQ
  • [25] PUSH2 0x002d
  • [26] JUMPI
  • [27] JUMPDEST
  • [28] PUSH0 0x
  • [29] DUP1
  • [30] REVERT
  • [31] JUMPDEST
  • [32] PUSH2 0x0035
  • [33] PUSH2 0x004b
  • [34] JUMP
  • [35] JUMPDEST
  • [36] PUSH1 0x40
  • [37] MLOAD
  • [38] PUSH2 0x0042
  • [39] SWAP2
  • [40] SWAP1
  • [41] PUSH2 0x00f8
  • [42] JUMP
  • [43] JUMPDEST
  • [44] PUSH1 0x40
  • [45] MLOAD
  • [46] DUP1
  • [47] SWAP2
  • [48] SUB
  • [49] SWAP1
  • [50] RETURN
  • [51] JUMPDEST
  • [52] PUSH1 0x60
  • [53] PUSH1 0x40
  • [54] MLOAD
  • [55] DUP1
  • [56] PUSH1 0x40
  • [57] ADD
  • [58] PUSH1 0x40
  • [59] MSTORE
  • [60] DUP1
  • [61] PUSH1 0x0c
  • [62] DUP2
  • [63] MSTORE
  • [64] PUSH1 0x20
  • [65] ADD
  • [66] PUSH32 0x48656c6c6f20576f726c64210000000000000000000000000000000000000000
  • [67] DUP2
  • [68] MSTORE
  • [69] POP
  • [70] SWAP1
  • [71] POP
  • [72] SWAP1
  • [73] JUMP
  • [74] JUMPDEST
  • [75] PUSH0 0x
  • [76] DUP2
  • [77] MLOAD
  • [78] SWAP1
  • [79] POP
  • [80] SWAP2
  • [81] SWAP1
  • [82] POP
  • [83] JUMP
  • [84] JUMPDEST
  • [85] PUSH0 0x
  • [86] DUP3
  • [87] DUP3
  • [88] MSTORE
  • [89] PUSH1 0x20
  • [90] DUP3
  • [91] ADD
  • [92] SWAP1
  • [93] POP
  • [94] SWAP3
  • [95] SWAP2
  • [96] POP
  • [97] POP
  • [98] JUMP
  • [99] JUMPDEST
  • [100] DUP3
  • [101] DUP2
  • [102] DUP4
  • [103] MCOPY
  • [104] PUSH0 0x
  • [105] DUP4
  • [106] DUP4
  • [107] ADD
  • [108] MSTORE
  • [109] POP
  • [110] POP
  • [111] POP
  • [112] JUMP
  • [113] JUMPDEST
  • [114] PUSH0 0x
  • [115] PUSH1 0x1f
  • [116] NOT
  • [117] PUSH1 0x1f
  • [118] DUP4
  • [119] ADD
  • [120] AND
  • [121] SWAP1
  • [122] POP
  • [123] SWAP2
  • [124] SWAP1
  • [125] POP
  • [126] JUMP
  • [127] JUMPDEST
  • [128] PUSH0 0x
  • [129] PUSH2 0x00ca
  • [130] DUP3
  • [131] PUSH2 0x0088
  • [132] JUMP
  • [133] JUMPDEST
  • [134] PUSH2 0x00d4
  • [135] DUP2
  • [136] DUP6
  • [137] PUSH2 0x0092
  • [138] JUMP
  • [139] JUMPDEST
  • [140] SWAP4
  • [141] POP
  • [142] PUSH2 0x00e4
  • [143] DUP2
  • [144] DUP6
  • [145] PUSH1 0x20
  • [146] DUP7
  • [147] ADD
  • [148] PUSH2 0x00a2
  • [149] JUMP
  • [150] JUMPDEST
  • [151] PUSH2 0x00ed
  • [152] DUP2
  • [153] PUSH2 0x00b0
  • [154] JUMP
  • [155] JUMPDEST
  • [156] DUP5
  • [157] ADD
  • [158] SWAP2
  • [159] POP
  • [160] POP
  • [161] SWAP3
  • [162] SWAP2
  • [163] POP
  • [164] POP
  • [165] JUMP
  • [166] JUMPDEST
  • [167] PUSH0 0x
  • [168] PUSH1 0x20
  • [169] DUP3
  • [170] ADD
  • [171] SWAP1
  • [172] POP
  • [173] DUP2
  • [174] DUP2
  • [175] SUB
  • [176] PUSH0 0x
  • [177] DUP4
  • [178] ADD
  • [179] MSTORE
  • [180] PUSH2 0x0110
  • [181] DUP2
  • [182] DUP5
  • [183] PUSH2 0x00c0
  • [184] JUMP
  • [185] JUMPDEST
  • [186] SWAP1
  • [187] POP
  • [188] SWAP3
  • [189] SWAP2
  • [190] POP
  • [191] POP
  • [192] JUMP
  • [193] 'fe'(Unknown Opcode)
  • [194] LOG2
  • [195] PUSH5 0x6970667358
  • [196] '22'(Unknown Opcode)
  • [197] SLT
  • [198] SHA3
  • [199] 'f7'(Unknown Opcode)
  • [200] '28'(Unknown Opcode)
  • [201] SWAP5
  • [202] PUSH6 0xdcd881a81577
  • [203] 'c7'(Unknown Opcode)
  • [204] '1f'(Unknown Opcode)
  • [205] ISZERO
  • [206] PUSH11 0x6176dbe8793360b1995913
  • [207] SIGNEXTEND
  • [208] MCOPY
  • [209] SWAP11
  • [210] 'e5'(Unknown Opcode)
  • [211] 'cc'(Unknown Opcode)
  • [212] SWAP11
  • [213] 'bb'(Unknown Opcode)
  • [214] PUSH5 0x736f6c6343
  • [215] STOP
  • [216] ADDMOD
  • [217] BYTE
  • [218] STOP
  • [219] CALLER