Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLVALUE
- [4] DUP1
- [5] ISZERO
- [6] PUSH2 0x000f
- [7] JUMPI
- [8] PUSH0 0x
- [9] DUP1
- [10] REVERT
- [11] JUMPDEST
- [12] POP
- [13] PUSH1 0x04
- [14] CALLDATASIZE
- [15] LT
- [16] PUSH2 0x003f
- [17] JUMPI
- [18] PUSH0 0x
- [19] CALLDATALOAD
- [20] PUSH1 0xe0
- [21] SHR
- [22] DUP1
- [23] PUSH4 0x3fb5c1cb
- [24] EQ
- [25] PUSH2 0x0043
- [26] JUMPI
- [27] DUP1
- [28] PUSH4 0x8381f58a
- [29] EQ
- [30] PUSH2 0x005f
- [31] JUMPI
- [32] DUP1
- [33] PUSH4 0xd09de08a
- [34] EQ
- [35] PUSH2 0x007d
- [36] JUMPI
- [37] JUMPDEST
- [38] PUSH0 0x
- [39] DUP1
- [40] REVERT
- [41] JUMPDEST
- [42] PUSH2 0x005d
- [43] PUSH1 0x04
- [44] DUP1
- [45] CALLDATASIZE
- [46] SUB
- [47] DUP2
- [48] ADD
- [49] SWAP1
- [50] PUSH2 0x0058
- [51] SWAP2
- [52] SWAP1
- [53] PUSH2 0x00e4
- [54] JUMP
- [55] JUMPDEST
- [56] PUSH2 0x0087
- [57] JUMP
- [58] JUMPDEST
- [59] STOP
- [60] JUMPDEST
- [61] PUSH2 0x0067
- [62] PUSH2 0x0090
- [63] JUMP
- [64] JUMPDEST
- [65] PUSH1 0x40
- [66] MLOAD
- [67] PUSH2 0x0074
- [68] SWAP2
- [69] SWAP1
- [70] PUSH2 0x011e
- [71] JUMP
- [72] JUMPDEST
- [73] PUSH1 0x40
- [74] MLOAD
- [75] DUP1
- [76] SWAP2
- [77] SUB
- [78] SWAP1
- [79] RETURN
- [80] JUMPDEST
- [81] PUSH2 0x0085
- [82] PUSH2 0x0095
- [83] JUMP
- [84] JUMPDEST
- [85] STOP
- [86] JUMPDEST
- [87] DUP1
- [88] PUSH0 0x
- [89] DUP2
- [90] SWAP1
- [91] SSTORE
- [92] POP
- [93] POP
- [94] JUMP
- [95] JUMPDEST
- [96] PUSH0 0x
- [97] SLOAD
- [98] DUP2
- [99] JUMP
- [100] JUMPDEST
- [101] PUSH0 0x
- [102] DUP1
- [103] DUP2
- [104] SLOAD
- [105] DUP1
- [106] SWAP3
- [107] SWAP2
- [108] SWAP1
- [109] PUSH2 0x00a6
- [110] SWAP1
- [111] PUSH2 0x0164
- [112] JUMP
- [113] JUMPDEST
- [114] SWAP2
- [115] SWAP1
- [116] POP
- [117] SSTORE
- [118] POP
- [119] JUMP
- [120] JUMPDEST
- [121] PUSH0 0x
- [122] DUP1
- [123] REVERT
- [124] JUMPDEST
- [125] PUSH0 0x
- [126] DUP2
- [127] SWAP1
- [128] POP
- [129] SWAP2
- [130] SWAP1
- [131] POP
- [132] JUMP
- [133] JUMPDEST
- [134] PUSH2 0x00c3
- [135] DUP2
- [136] PUSH2 0x00b1
- [137] JUMP
- [138] JUMPDEST
- [139] DUP2
- [140] EQ
- [141] PUSH2 0x00cd
- [142] JUMPI
- [143] PUSH0 0x
- [144] DUP1
- [145] REVERT
- [146] JUMPDEST
- [147] POP
- [148] JUMP
- [149] JUMPDEST
- [150] PUSH0 0x
- [151] DUP2
- [152] CALLDATALOAD
- [153] SWAP1
- [154] POP
- [155] PUSH2 0x00de
- [156] DUP2
- [157] PUSH2 0x00ba
- [158] JUMP
- [159] JUMPDEST
- [160] SWAP3
- [161] SWAP2
- [162] POP
- [163] POP
- [164] JUMP
- [165] JUMPDEST
- [166] PUSH0 0x
- [167] PUSH1 0x20
- [168] DUP3
- [169] DUP5
- [170] SUB
- [171] SLT
- [172] ISZERO
- [173] PUSH2 0x00f9
- [174] JUMPI
- [175] PUSH2 0x00f8
- [176] PUSH2 0x00ad
- [177] JUMP
- [178] JUMPDEST
- [179] JUMPDEST
- [180] PUSH0 0x
- [181] PUSH2 0x0106
- [182] DUP5
- [183] DUP3
- [184] DUP6
- [185] ADD
- [186] PUSH2 0x00d0
- [187] JUMP
- [188] JUMPDEST
- [189] SWAP2
- [190] POP
- [191] POP
- [192] SWAP3
- [193] SWAP2
- [194] POP
- [195] POP
- [196] JUMP
- [197] JUMPDEST
- [198] PUSH2 0x0118
- [199] DUP2
- [200] PUSH2 0x00b1
- [201] JUMP
- [202] JUMPDEST
- [203] DUP3
- [204] MSTORE
- [205] POP
- [206] POP
- [207] JUMP
- [208] JUMPDEST
- [209] PUSH0 0x
- [210] PUSH1 0x20
- [211] DUP3
- [212] ADD
- [213] SWAP1
- [214] POP
- [215] PUSH2 0x0131
- [216] PUSH0 0x
- [217] DUP4
- [218] ADD
- [219] DUP5
- [220] PUSH2 0x010f
- [221] JUMP
- [222] JUMPDEST
- [223] SWAP3
- [224] SWAP2
- [225] POP
- [226] POP
- [227] JUMP
- [228] JUMPDEST
- [229] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
- [230] PUSH0 0x
- [231] MSTORE
- [232] PUSH1 0x11
- [233] PUSH1 0x04
- [234] MSTORE
- [235] PUSH1 0x24
- [236] PUSH0 0x
- [237] REVERT
- [238] JUMPDEST
- [239] PUSH0 0x
- [240] PUSH2 0x016e
- [241] DUP3
- [242] PUSH2 0x00b1
- [243] JUMP
- [244] JUMPDEST
- [245] SWAP2
- [246] POP
- [247] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
- [248] DUP3
- [249] SUB
- [250] PUSH2 0x01a0
- [251] JUMPI
- [252] PUSH2 0x019f
- [253] PUSH2 0x0137
- [254] JUMP
- [255] JUMPDEST
- [256] JUMPDEST
- [257] PUSH1 0x01
- [258] DUP3
- [259] ADD
- [260] SWAP1
- [261] POP
- [262] SWAP2
- [263] SWAP1
- [264] POP
- [265] JUMP
- [266] 'fe'(Unknown Opcode)
- [267] LOG2
- [268] PUSH5 0x6970667358
- [269] '22'(Unknown Opcode)
- [270] SLT
- [271] SHA3
- [272] DUP7
- [273] 'fe'(Unknown Opcode)
- [274] 'c4'(Unknown Opcode)
- [275] PUSH2 0xa2f4
- [276] 'c8'(Unknown Opcode)
- [277] 'd4'(Unknown Opcode)
- [278] DUP1
- [279] PUSH12 0x8b8d1aefec7cc9ee5d2a959b
- [280] 'e5'(Unknown Opcode)
- [281] DUP2
- [282] BASEFEE
- [283] 'bb'(Unknown Opcode)
- [284] LOG0
- [285] SUB
- [286] CALLCODE