Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x0010
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0036
  • [17] JUMPI
  • [18] PUSH1 0x00
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x8da5cb5b
  • [24] EQ
  • [25] PUSH2 0x003b
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0xf2fde38b
  • [29] EQ
  • [30] PUSH2 0x006c
  • [31] JUMPI
  • [32] JUMPDEST
  • [33] PUSH1 0x00
  • [34] DUP1
  • [35] REVERT
  • [36] JUMPDEST
  • [37] PUSH2 0x0043
  • [38] PUSH2 0x0081
  • [39] JUMP
  • [40] JUMPDEST
  • [41] PUSH1 0x40
  • [42] MLOAD
  • [43] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [44] SWAP1
  • [45] SWAP2
  • [46] AND
  • [47] DUP2
  • [48] MSTORE
  • [49] PUSH1 0x20
  • [50] ADD
  • [51] PUSH1 0x40
  • [52] MLOAD
  • [53] DUP1
  • [54] SWAP2
  • [55] SUB
  • [56] SWAP1
  • [57] RETURN
  • [58] JUMPDEST
  • [59] PUSH2 0x007f
  • [60] PUSH2 0x007a
  • [61] CALLDATASIZE
  • [62] PUSH1 0x04
  • [63] PUSH2 0x0206
  • [64] JUMP
  • [65] JUMPDEST
  • [66] PUSH2 0x00c6
  • [67] JUMP
  • [68] JUMPDEST
  • [69] STOP
  • [70] JUMPDEST
  • [71] PUSH1 0x00
  • [72] PUSH2 0x00c1
  • [73] PUSH32 0xc8fcad8db84d3cc18b4c41d551ea0ee66dd599cde068d998e57d5e09332c1320
  • [74] SLOAD
  • [75] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [76] AND
  • [77] SWAP1
  • [78] JUMP
  • [79] JUMPDEST
  • [80] SWAP1
  • [81] POP
  • [82] SWAP1
  • [83] JUMP
  • [84] JUMPDEST
  • [85] PUSH2 0x00ce
  • [86] PUSH2 0x00da
  • [87] JUMP
  • [88] JUMPDEST
  • [89] PUSH2 0x00d7
  • [90] DUP2
  • [91] PUSH2 0x014c
  • [92] JUMP
  • [93] JUMPDEST
  • [94] POP
  • [95] JUMP
  • [96] JUMPDEST
  • [97] PUSH32 0xc8fcad8db84d3cc18b4c41d551ea0ee66dd599cde068d998e57d5e09332c1320
  • [98] SLOAD
  • [99] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [100] AND
  • [101] CALLER
  • [102] EQ
  • [103] PUSH2 0x014a
  • [104] JUMPI
  • [105] PUSH1 0x40
  • [106] MLOAD
  • [107] PUSH32 0x44b7c5e900000000000000000000000000000000000000000000000000000000
  • [108] DUP2
  • [109] MSTORE
  • [110] PUSH1 0x04
  • [111] ADD
  • [112] PUSH1 0x40
  • [113] MLOAD
  • [114] DUP1
  • [115] SWAP2
  • [116] SUB
  • [117] SWAP1
  • [118] REVERT
  • [119] JUMPDEST
  • [120] JUMP
  • [121] JUMPDEST
  • [122] PUSH32 0xc8fcad8db84d3cc18b4c41d551ea0ee66dd599cde068d998e57d5e09332c1320
  • [123] DUP1
  • [124] SLOAD
  • [125] PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
  • [126] DUP2
  • [127] AND
  • [128] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [129] DUP5
  • [130] DUP2
  • [131] AND
  • [132] SWAP2
  • [133] DUP3
  • [134] OR
  • [135] SWAP1
  • [136] SWAP4
  • [137] SSTORE
  • [138] PUSH1 0x40
  • [139] MLOAD
  • [140] PUSH32 0xc8fcad8db84d3cc18b4c41d551ea0ee66dd599cde068d998e57d5e09332c131c
  • [141] SWAP4
  • [142] SWAP1
  • [143] SWAP3
  • [144] AND
  • [145] SWAP2
  • [146] DUP3
  • [147] SWAP1
  • [148] PUSH32 0x8be0079c531659141344cd1fd0a4f28419497f9722a3daafe3b4186f6b6457e0
  • [149] SWAP1
  • [150] PUSH1 0x00
  • [151] SWAP1
  • [152] LOG3
  • [153] POP
  • [154] POP
  • [155] POP
  • [156] JUMP
  • [157] JUMPDEST
  • [158] PUSH1 0x00
  • [159] PUSH1 0x20
  • [160] DUP3
  • [161] DUP5
  • [162] SUB
  • [163] SLT
  • [164] ISZERO
  • [165] PUSH2 0x0218
  • [166] JUMPI
  • [167] PUSH1 0x00
  • [168] DUP1
  • [169] REVERT
  • [170] JUMPDEST
  • [171] DUP2
  • [172] CALLDATALOAD
  • [173] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [174] DUP2
  • [175] AND
  • [176] DUP2
  • [177] EQ
  • [178] PUSH2 0x023c
  • [179] JUMPI
  • [180] PUSH1 0x00
  • [181] DUP1
  • [182] REVERT
  • [183] JUMPDEST
  • [184] SWAP4
  • [185] SWAP3
  • [186] POP
  • [187] POP
  • [188] POP
  • [189] JUMP
  • [190] 'fe'(Unknown Opcode)
  • [191] LOG2
  • [192] PUSH5 0x6970667358
  • [193] '22'(Unknown Opcode)
  • [194] SLT
  • [195] SHA3
  • [196] STOP
  • [197] 'b7'(Unknown Opcode)
  • [198] ORIGIN
  • [199] SIGNEXTEND
  • [200] CALL
  • [201] CALLDATASIZE
  • [202] 'db'(Unknown Opcode)
  • [203] CHAINID
  • [204] '29'(Unknown Opcode)
  • [205] PUSH21 0xdf48ea90afb268c77666615dec4422eeb62a2a8203
  • [206] JUMPDEST
  • [207] PUSH5 0x736f6c6343
  • [208] STOP
  • [209] ADDMOD
  • [210] OR
  • [211] STOP
  • [212] CALLER