Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x04
  • [2] CALLDATASIZE
  • [3] LT
  • [4] ISZERO
  • [5] PUSH2 0x000f
  • [6] JUMPI
  • [7] PUSH1 0x00
  • [8] DUP1
  • [9] REVERT
  • [10] JUMPDEST
  • [11] PUSH1 0x00
  • [12] CALLDATALOAD
  • [13] PUSH1 0xe0
  • [14] SHR
  • [15] PUSH4 0x570e1a36
  • [16] EQ
  • [17] PUSH2 0x0024
  • [18] JUMPI
  • [19] PUSH1 0x00
  • [20] DUP1
  • [21] REVERT
  • [22] JUMPDEST
  • [23] CALLVALUE
  • [24] PUSH2 0x0132
  • [25] JUMPI
  • [26] PUSH1 0x20
  • [27] CALLDATASIZE
  • [28] PUSH1 0x03
  • [29] NOT
  • [30] ADD
  • [31] SLT
  • [32] PUSH2 0x0132
  • [33] JUMPI
  • [34] PUSH1 0x04
  • [35] CALLDATALOAD
  • [36] PUSH8 0xffffffffffffffff
  • [37] DUP2
  • [38] GT
  • [39] PUSH2 0x0132
  • [40] JUMPI
  • [41] CALLDATASIZE
  • [42] PUSH1 0x23
  • [43] DUP3
  • [44] ADD
  • [45] SLT
  • [46] ISZERO
  • [47] PUSH2 0x0132
  • [48] JUMPI
  • [49] DUP1
  • [50] PUSH1 0x04
  • [51] ADD
  • [52] CALLDATALOAD
  • [53] PUSH8 0xffffffffffffffff
  • [54] DUP2
  • [55] GT
  • [56] PUSH2 0x0132
  • [57] JUMPI
  • [58] CALLDATASIZE
  • [59] PUSH1 0x24
  • [60] DUP3
  • [61] DUP5
  • [62] ADD
  • [63] ADD
  • [64] GT
  • [65] PUSH2 0x0132
  • [66] JUMPI
  • [67] PUSH1 0x00
  • [68] SWAP3
  • [69] DUP2
  • [70] PUSH1 0x14
  • [71] GT
  • [72] PUSH2 0x012e
  • [73] JUMPI
  • [74] PUSH1 0x13
  • [75] NOT
  • [76] DUP3
  • [77] ADD
  • [78] SWAP2
  • [79] PUSH8 0xffffffffffffffff
  • [80] DUP4
  • [81] GT
  • [82] PUSH2 0x011a
  • [83] JUMPI
  • [84] PUSH1 0x0b
  • [85] DUP2
  • [86] ADD
  • [87] PUSH1 0x1f
  • [88] NOT
  • [89] SWAP1
  • [90] DUP2
  • [91] AND
  • [92] PUSH1 0x3f
  • [93] ADD
  • [94] AND
  • [95] DUP3
  • [96] ADD
  • [97] PUSH8 0xffffffffffffffff
  • [98] DUP2
  • [99] GT
  • [100] DUP4
  • [101] DUP3
  • [102] LT
  • [103] OR
  • [104] PUSH2 0x0106
  • [105] JUMPI
  • [106] PUSH1 0x24
  • [107] PUSH1 0x20
  • [108] SWAP6
  • [109] SWAP4
  • [110] DUP8
  • [111] PUSH1 0x0c
  • [112] DUP2
  • [113] SWAP8
  • [114] SWAP6
  • [115] DUP3
  • [116] SWAP6
  • [117] PUSH1 0x40
  • [118] MSTORE
  • [119] DUP7
  • [120] DUP5
  • [121] MSTORE
  • [122] DUP10
  • [123] DUP5
  • [124] ADD
  • [125] SWAP7
  • [126] PUSH1 0x38
  • [127] DUP10
  • [128] ADD
  • [129] DUP9
  • [130] CALLDATACOPY
  • [131] DUP4
  • [132] ADD
  • [133] ADD
  • [134] MSTORE
  • [135] MLOAD
  • [136] SWAP4
  • [137] ADD
  • [138] CALLDATALOAD
  • [139] PUSH1 0x60
  • [140] SHR
  • [141] GAS
  • [142] CALL
  • [143] SWAP1
  • [144] MLOAD
  • [145] SWAP1
  • [146] ISZERO
  • [147] PUSH2 0x00fe
  • [148] JUMPI
  • [149] JUMPDEST
  • [150] PUSH1 0x40
  • [151] MLOAD
  • [152] PUSH1 0x01
  • [153] PUSH1 0x01
  • [154] PUSH1 0xa0
  • [155] SHL
  • [156] SUB
  • [157] SWAP1
  • [158] SWAP2
  • [159] AND
  • [160] DUP2
  • [161] MSTORE
  • [162] PUSH1 0x20
  • [163] SWAP1
  • [164] RETURN
  • [165] JUMPDEST
  • [166] POP
  • [167] PUSH1 0x00
  • [168] PUSH2 0x00e9
  • [169] JUMP
  • [170] JUMPDEST
  • [171] PUSH4 0x4e487b71
  • [172] PUSH1 0xe0
  • [173] SHL
  • [174] DUP7
  • [175] MSTORE
  • [176] PUSH1 0x41
  • [177] PUSH1 0x04
  • [178] MSTORE
  • [179] PUSH1 0x24
  • [180] DUP7
  • [181] REVERT
  • [182] JUMPDEST
  • [183] PUSH4 0x4e487b71
  • [184] PUSH1 0xe0
  • [185] SHL
  • [186] DUP6
  • [187] MSTORE
  • [188] PUSH1 0x41
  • [189] PUSH1 0x04
  • [190] MSTORE
  • [191] PUSH1 0x24
  • [192] DUP6
  • [193] REVERT
  • [194] JUMPDEST
  • [195] DUP4
  • [196] DUP1
  • [197] REVERT
  • [198] JUMPDEST
  • [199] PUSH1 0x00
  • [200] DUP1
  • [201] REVERT
  • [202] 'fe'(Unknown Opcode)
  • [203] LOG2
  • [204] PUSH5 0x6970667358
  • [205] '22'(Unknown Opcode)
  • [206] SLT
  • [207] SHA3
  • [208] DUP14
  • [209] RETURNDATASIZE
  • [210] ISZERO
  • [211] CALL
  • [212] LOG1
  • [213] PUSH6 0x1d00f2ed3b61
  • [214] DUP11
  • [215] POP
  • [216] PUSH18 0x7a7de16a758bd696cf961337d90cc7bf3764