Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x0a
  • [4] PUSH1 0x0c
  • [5] JUMP
  • [6] JUMPDEST
  • [7] STOP
  • [8] JUMPDEST
  • [9] PUSH1 0x18
  • [10] PUSH1 0x14
  • [11] PUSH1 0x1a
  • [12] JUMP
  • [13] JUMPDEST
  • [14] PUSH1 0x27
  • [15] JUMP
  • [16] JUMPDEST
  • [17] JUMP
  • [18] JUMPDEST
  • [19] PUSH1 0x00
  • [20] PUSH1 0x22
  • [21] PUSH1 0x4c
  • [22] JUMP
  • [23] JUMPDEST
  • [24] SWAP1
  • [25] POP
  • [26] SWAP1
  • [27] JUMP
  • [28] JUMPDEST
  • [29] CALLDATASIZE
  • [30] PUSH1 0x00
  • [31] DUP1
  • [32] CALLDATACOPY
  • [33] PUSH1 0x00
  • [34] DUP1
  • [35] CALLDATASIZE
  • [36] PUSH1 0x00
  • [37] DUP5
  • [38] GAS
  • [39] DELEGATECALL
  • [40] RETURNDATASIZE
  • [41] PUSH1 0x00
  • [42] DUP1
  • [43] RETURNDATACOPY
  • [44] DUP1
  • [45] PUSH1 0x00
  • [46] DUP2
  • [47] EQ
  • [48] PUSH1 0x47
  • [49] JUMPI
  • [50] RETURNDATASIZE
  • [51] PUSH1 0x00
  • [52] RETURN
  • [53] JUMPDEST
  • [54] RETURNDATASIZE
  • [55] PUSH1 0x00
  • [56] REVERT
  • [57] JUMPDEST
  • [58] PUSH1 0x00
  • [59] PUSH1 0x78
  • [60] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
  • [61] PUSH1 0x00
  • [62] SHL
  • [63] PUSH1 0xa1
  • [64] JUMP
  • [65] JUMPDEST
  • [66] PUSH1 0x00
  • [67] ADD
  • [68] PUSH1 0x00
  • [69] SWAP1
  • [70] SLOAD
  • [71] SWAP1
  • [72] PUSH2 0x0100
  • [73] EXP
  • [74] SWAP1
  • [75] DIV
  • [76] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [77] AND
  • [78] SWAP1
  • [79] POP
  • [80] SWAP1
  • [81] JUMP
  • [82] JUMPDEST
  • [83] PUSH1 0x00
  • [84] DUP2
  • [85] SWAP1
  • [86] POP
  • [87] SWAP2
  • [88] SWAP1
  • [89] POP
  • [90] JUMP
  • [91] 'fe'(Unknown Opcode)
  • [92] LOG2
  • [93] PUSH5 0x6970667358
  • [94] '22'(Unknown Opcode)
  • [95] SLT
  • [96] SHA3
  • [97] COINBASE
  • [98] LOG2
  • [99] PUSH26 0x53478306ba8612ebf56791d0be3be840199c19e335afbff17ead
  • [100] 'fc'(Unknown Opcode)
  • [101] DUP5
  • [102] 'ef'(Unknown Opcode)
  • [103] PUSH5 0x736f6c6343
  • [104] STOP
  • [105] ADDMOD
  • [106] ISZERO
  • [107] STOP
  • [108] CALLER