Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLVALUE
- [4] DUP1
- [5] ISZERO
- [6] PUSH2 0x000f
- [7] JUMPI
- [8] PUSH0 0x
- [9] DUP1
- [10] REVERT
- [11] JUMPDEST
- [12] POP
- [13] PUSH1 0x04
- [14] CALLDATASIZE
- [15] LT
- [16] PUSH2 0x0029
- [17] JUMPI
- [18] PUSH0 0x
- [19] CALLDATALOAD
- [20] PUSH1 0xe0
- [21] SHR
- [22] DUP1
- [23] PUSH4 0xe21f37ce
- [24] EQ
- [25] PUSH2 0x002d
- [26] JUMPI
- [27] JUMPDEST
- [28] PUSH0 0x
- [29] DUP1
- [30] REVERT
- [31] JUMPDEST
- [32] PUSH2 0x0035
- [33] PUSH2 0x004b
- [34] JUMP
- [35] JUMPDEST
- [36] PUSH1 0x40
- [37] MLOAD
- [38] PUSH2 0x0042
- [39] SWAP2
- [40] SWAP1
- [41] PUSH2 0x0160
- [42] JUMP
- [43] JUMPDEST
- [44] PUSH1 0x40
- [45] MLOAD
- [46] DUP1
- [47] SWAP2
- [48] SUB
- [49] SWAP1
- [50] RETURN
- [51] JUMPDEST
- [52] PUSH0 0x
- [53] DUP1
- [54] SLOAD
- [55] PUSH2 0x0057
- [56] SWAP1
- [57] PUSH2 0x01ad
- [58] JUMP
- [59] JUMPDEST
- [60] DUP1
- [61] PUSH1 0x1f
- [62] ADD
- [63] PUSH1 0x20
- [64] DUP1
- [65] SWAP2
- [66] DIV
- [67] MUL
- [68] PUSH1 0x20
- [69] ADD
- [70] PUSH1 0x40
- [71] MLOAD
- [72] SWAP1
- [73] DUP2
- [74] ADD
- [75] PUSH1 0x40
- [76] MSTORE
- [77] DUP1
- [78] SWAP3
- [79] SWAP2
- [80] SWAP1
- [81] DUP2
- [82] DUP2
- [83] MSTORE
- [84] PUSH1 0x20
- [85] ADD
- [86] DUP3
- [87] DUP1
- [88] SLOAD
- [89] PUSH2 0x0083
- [90] SWAP1
- [91] PUSH2 0x01ad
- [92] JUMP
- [93] JUMPDEST
- [94] DUP1
- [95] ISZERO
- [96] PUSH2 0x00ce
- [97] JUMPI
- [98] DUP1
- [99] PUSH1 0x1f
- [100] LT
- [101] PUSH2 0x00a5
- [102] JUMPI
- [103] PUSH2 0x0100
- [104] DUP1
- [105] DUP4
- [106] SLOAD
- [107] DIV
- [108] MUL
- [109] DUP4
- [110] MSTORE
- [111] SWAP2
- [112] PUSH1 0x20
- [113] ADD
- [114] SWAP2
- [115] PUSH2 0x00ce
- [116] JUMP
- [117] JUMPDEST
- [118] DUP3
- [119] ADD
- [120] SWAP2
- [121] SWAP1
- [122] PUSH0 0x
- [123] MSTORE
- [124] PUSH1 0x20
- [125] PUSH0 0x
- [126] SHA3
- [127] SWAP1
- [128] JUMPDEST
- [129] DUP2
- [130] SLOAD
- [131] DUP2
- [132] MSTORE
- [133] SWAP1
- [134] PUSH1 0x01
- [135] ADD
- [136] SWAP1
- [137] PUSH1 0x20
- [138] ADD
- [139] DUP1
- [140] DUP4
- [141] GT
- [142] PUSH2 0x00b1
- [143] JUMPI
- [144] DUP3
- [145] SWAP1
- [146] SUB
- [147] PUSH1 0x1f
- [148] AND
- [149] DUP3
- [150] ADD
- [151] SWAP2
- [152] JUMPDEST
- [153] POP
- [154] POP
- [155] POP
- [156] POP
- [157] POP
- [158] DUP2
- [159] JUMP
- [160] JUMPDEST
- [161] PUSH0 0x
- [162] DUP2
- [163] MLOAD
- [164] SWAP1
- [165] POP
- [166] SWAP2
- [167] SWAP1
- [168] POP
- [169] JUMP
- [170] JUMPDEST
- [171] PUSH0 0x
- [172] DUP3
- [173] DUP3
- [174] MSTORE
- [175] PUSH1 0x20
- [176] DUP3
- [177] ADD
- [178] SWAP1
- [179] POP
- [180] SWAP3
- [181] SWAP2
- [182] POP
- [183] POP
- [184] JUMP
- [185] JUMPDEST
- [186] PUSH0 0x
- [187] JUMPDEST
- [188] DUP4
- [189] DUP2
- [190] LT
- [191] ISZERO
- [192] PUSH2 0x010d
- [193] JUMPI
- [194] DUP1
- [195] DUP3
- [196] ADD
- [197] MLOAD
- [198] DUP2
- [199] DUP5
- [200] ADD
- [201] MSTORE
- [202] PUSH1 0x20
- [203] DUP2
- [204] ADD
- [205] SWAP1
- [206] POP
- [207] PUSH2 0x00f2
- [208] JUMP
- [209] JUMPDEST
- [210] PUSH0 0x
- [211] DUP5
- [212] DUP5
- [213] ADD
- [214] MSTORE
- [215] POP
- [216] POP
- [217] POP
- [218] POP
- [219] JUMP
- [220] JUMPDEST
- [221] PUSH0 0x
- [222] PUSH1 0x1f
- [223] NOT
- [224] PUSH1 0x1f
- [225] DUP4
- [226] ADD
- [227] AND
- [228] SWAP1
- [229] POP
- [230] SWAP2
- [231] SWAP1
- [232] POP
- [233] JUMP
- [234] JUMPDEST
- [235] PUSH0 0x
- [236] PUSH2 0x0132
- [237] DUP3
- [238] PUSH2 0x00d6
- [239] JUMP
- [240] JUMPDEST
- [241] PUSH2 0x013c
- [242] DUP2
- [243] DUP6
- [244] PUSH2 0x00e0
- [245] JUMP
- [246] JUMPDEST
- [247] SWAP4
- [248] POP
- [249] PUSH2 0x014c
- [250] DUP2
- [251] DUP6
- [252] PUSH1 0x20
- [253] DUP7
- [254] ADD
- [255] PUSH2 0x00f0
- [256] JUMP
- [257] JUMPDEST
- [258] PUSH2 0x0155
- [259] DUP2
- [260] PUSH2 0x0118
- [261] JUMP
- [262] JUMPDEST
- [263] DUP5
- [264] ADD
- [265] SWAP2
- [266] POP
- [267] POP
- [268] SWAP3
- [269] SWAP2
- [270] POP
- [271] POP
- [272] JUMP
- [273] JUMPDEST
- [274] PUSH0 0x
- [275] PUSH1 0x20
- [276] DUP3
- [277] ADD
- [278] SWAP1
- [279] POP
- [280] DUP2
- [281] DUP2
- [282] SUB
- [283] PUSH0 0x
- [284] DUP4
- [285] ADD
- [286] MSTORE
- [287] PUSH2 0x0178
- [288] DUP2
- [289] DUP5
- [290] PUSH2 0x0128
- [291] JUMP
- [292] JUMPDEST
- [293] SWAP1
- [294] POP
- [295] SWAP3
- [296] SWAP2
- [297] POP
- [298] POP
- [299] JUMP
- [300] JUMPDEST
- [301] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
- [302] PUSH0 0x
- [303] MSTORE
- [304] PUSH1 0x22
- [305] PUSH1 0x04
- [306] MSTORE
- [307] PUSH1 0x24
- [308] PUSH0 0x
- [309] REVERT
- [310] JUMPDEST
- [311] PUSH0 0x
- [312] PUSH1 0x02
- [313] DUP3
- [314] DIV
- [315] SWAP1
- [316] POP
- [317] PUSH1 0x01
- [318] DUP3
- [319] AND
- [320] DUP1
- [321] PUSH2 0x01c4
- [322] JUMPI
- [323] PUSH1 0x7f
- [324] DUP3
- [325] AND
- [326] SWAP2
- [327] POP
- [328] JUMPDEST
- [329] PUSH1 0x20
- [330] DUP3
- [331] LT
- [332] DUP2
- [333] SUB
- [334] PUSH2 0x01d7
- [335] JUMPI
- [336] PUSH2 0x01d6
- [337] PUSH2 0x0180
- [338] JUMP
- [339] JUMPDEST
- [340] JUMPDEST
- [341] POP
- [342] SWAP2
- [343] SWAP1
- [344] POP
- [345] JUMP
- [346] 'fe'(Unknown Opcode)
- [347] LOG2
- [348] PUSH5 0x6970667358
- [349] '22'(Unknown Opcode)
- [350] SLT
- [351] SHA3
- [352] 'c8'(Unknown Opcode)
- [353] PUSH0 0x
- [354] 'ea'(Unknown Opcode)
- [355] SUB
- [356] '24'(Unknown Opcode)
- [357] 'ca'(Unknown Opcode)
- [358] '22'(Unknown Opcode)
- [359] 'e4'(Unknown Opcode)
- [360] 'e9'(Unknown Opcode)
- [361] LOG1
- [362] PUSH22 0x25058b1718d79367d88bc5ed443be1ca6b47561fa164