Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] PUSH0 0x
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0034
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0xcfae3217
  • [24] EQ
  • [25] PUSH2 0x0038
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0xef690cc0
  • [29] EQ
  • [30] PUSH2 0x0056
  • [31] JUMPI
  • [32] JUMPDEST
  • [33] PUSH0 0x
  • [34] PUSH0 0x
  • [35] REVERT
  • [36] JUMPDEST
  • [37] PUSH2 0x0040
  • [38] PUSH2 0x005e
  • [39] JUMP
  • [40] JUMPDEST
  • [41] PUSH1 0x40
  • [42] MLOAD
  • [43] PUSH2 0x004d
  • [44] SWAP2
  • [45] SWAP1
  • [46] PUSH2 0x0178
  • [47] JUMP
  • [48] JUMPDEST
  • [49] PUSH1 0x40
  • [50] MLOAD
  • [51] DUP1
  • [52] SWAP2
  • [53] SUB
  • [54] SWAP1
  • [55] RETURN
  • [56] JUMPDEST
  • [57] PUSH2 0x0040
  • [58] PUSH2 0x00ed
  • [59] JUMP
  • [60] JUMPDEST
  • [61] PUSH1 0x60
  • [62] PUSH0 0x
  • [63] DUP1
  • [64] SLOAD
  • [65] PUSH2 0x006c
  • [66] SWAP1
  • [67] PUSH2 0x01ad
  • [68] JUMP
  • [69] JUMPDEST
  • [70] DUP1
  • [71] PUSH1 0x1f
  • [72] ADD
  • [73] PUSH1 0x20
  • [74] DUP1
  • [75] SWAP2
  • [76] DIV
  • [77] MUL
  • [78] PUSH1 0x20
  • [79] ADD
  • [80] PUSH1 0x40
  • [81] MLOAD
  • [82] SWAP1
  • [83] DUP2
  • [84] ADD
  • [85] PUSH1 0x40
  • [86] MSTORE
  • [87] DUP1
  • [88] SWAP3
  • [89] SWAP2
  • [90] SWAP1
  • [91] DUP2
  • [92] DUP2
  • [93] MSTORE
  • [94] PUSH1 0x20
  • [95] ADD
  • [96] DUP3
  • [97] DUP1
  • [98] SLOAD
  • [99] PUSH2 0x0098
  • [100] SWAP1
  • [101] PUSH2 0x01ad
  • [102] JUMP
  • [103] JUMPDEST
  • [104] DUP1
  • [105] ISZERO
  • [106] PUSH2 0x00e3
  • [107] JUMPI
  • [108] DUP1
  • [109] PUSH1 0x1f
  • [110] LT
  • [111] PUSH2 0x00ba
  • [112] JUMPI
  • [113] PUSH2 0x0100
  • [114] DUP1
  • [115] DUP4
  • [116] SLOAD
  • [117] DIV
  • [118] MUL
  • [119] DUP4
  • [120] MSTORE
  • [121] SWAP2
  • [122] PUSH1 0x20
  • [123] ADD
  • [124] SWAP2
  • [125] PUSH2 0x00e3
  • [126] JUMP
  • [127] JUMPDEST
  • [128] DUP3
  • [129] ADD
  • [130] SWAP2
  • [131] SWAP1
  • [132] PUSH0 0x
  • [133] MSTORE
  • [134] PUSH1 0x20
  • [135] PUSH0 0x
  • [136] SHA3
  • [137] SWAP1
  • [138] JUMPDEST
  • [139] DUP2
  • [140] SLOAD
  • [141] DUP2
  • [142] MSTORE
  • [143] SWAP1
  • [144] PUSH1 0x01
  • [145] ADD
  • [146] SWAP1
  • [147] PUSH1 0x20
  • [148] ADD
  • [149] DUP1
  • [150] DUP4
  • [151] GT
  • [152] PUSH2 0x00c6
  • [153] JUMPI
  • [154] DUP3
  • [155] SWAP1
  • [156] SUB
  • [157] PUSH1 0x1f
  • [158] AND
  • [159] DUP3
  • [160] ADD
  • [161] SWAP2
  • [162] JUMPDEST
  • [163] POP
  • [164] POP
  • [165] POP
  • [166] POP
  • [167] POP
  • [168] SWAP1
  • [169] POP
  • [170] SWAP1
  • [171] JUMP
  • [172] JUMPDEST
  • [173] PUSH0 0x
  • [174] DUP1
  • [175] SLOAD
  • [176] PUSH2 0x00f9
  • [177] SWAP1
  • [178] PUSH2 0x01ad
  • [179] JUMP
  • [180] JUMPDEST
  • [181] DUP1
  • [182] PUSH1 0x1f
  • [183] ADD
  • [184] PUSH1 0x20
  • [185] DUP1
  • [186] SWAP2
  • [187] DIV
  • [188] MUL
  • [189] PUSH1 0x20
  • [190] ADD
  • [191] PUSH1 0x40
  • [192] MLOAD
  • [193] SWAP1
  • [194] DUP2
  • [195] ADD
  • [196] PUSH1 0x40
  • [197] MSTORE
  • [198] DUP1
  • [199] SWAP3
  • [200] SWAP2
  • [201] SWAP1
  • [202] DUP2
  • [203] DUP2
  • [204] MSTORE
  • [205] PUSH1 0x20
  • [206] ADD
  • [207] DUP3
  • [208] DUP1
  • [209] SLOAD
  • [210] PUSH2 0x0125
  • [211] SWAP1
  • [212] PUSH2 0x01ad
  • [213] JUMP
  • [214] JUMPDEST
  • [215] DUP1
  • [216] ISZERO
  • [217] PUSH2 0x0170
  • [218] JUMPI
  • [219] DUP1
  • [220] PUSH1 0x1f
  • [221] LT
  • [222] PUSH2 0x0147
  • [223] JUMPI
  • [224] PUSH2 0x0100
  • [225] DUP1
  • [226] DUP4
  • [227] SLOAD
  • [228] DIV
  • [229] MUL
  • [230] DUP4
  • [231] MSTORE
  • [232] SWAP2
  • [233] PUSH1 0x20
  • [234] ADD
  • [235] SWAP2
  • [236] PUSH2 0x0170
  • [237] JUMP
  • [238] JUMPDEST
  • [239] DUP3
  • [240] ADD
  • [241] SWAP2
  • [242] SWAP1
  • [243] PUSH0 0x
  • [244] MSTORE
  • [245] PUSH1 0x20
  • [246] PUSH0 0x
  • [247] SHA3
  • [248] SWAP1
  • [249] JUMPDEST
  • [250] DUP2
  • [251] SLOAD
  • [252] DUP2
  • [253] MSTORE
  • [254] SWAP1
  • [255] PUSH1 0x01
  • [256] ADD
  • [257] SWAP1
  • [258] PUSH1 0x20
  • [259] ADD
  • [260] DUP1
  • [261] DUP4
  • [262] GT
  • [263] PUSH2 0x0153
  • [264] JUMPI
  • [265] DUP3
  • [266] SWAP1
  • [267] SUB
  • [268] PUSH1 0x1f
  • [269] AND
  • [270] DUP3
  • [271] ADD
  • [272] SWAP2
  • [273] JUMPDEST
  • [274] POP
  • [275] POP
  • [276] POP
  • [277] POP
  • [278] POP
  • [279] DUP2
  • [280] JUMP
  • [281] JUMPDEST
  • [282] PUSH1 0x20
  • [283] DUP2
  • [284] MSTORE
  • [285] PUSH0 0x
  • [286] DUP3
  • [287] MLOAD
  • [288] DUP1
  • [289] PUSH1 0x20
  • [290] DUP5
  • [291] ADD
  • [292] MSTORE
  • [293] DUP1
  • [294] PUSH1 0x20
  • [295] DUP6
  • [296] ADD
  • [297] PUSH1 0x40
  • [298] DUP6
  • [299] ADD
  • [300] MCOPY
  • [301] PUSH0 0x
  • [302] PUSH1 0x40
  • [303] DUP3
  • [304] DUP6
  • [305] ADD
  • [306] ADD
  • [307] MSTORE
  • [308] PUSH1 0x40
  • [309] PUSH1 0x1f
  • [310] NOT
  • [311] PUSH1 0x1f
  • [312] DUP4
  • [313] ADD
  • [314] AND
  • [315] DUP5
  • [316] ADD
  • [317] ADD
  • [318] SWAP2
  • [319] POP
  • [320] POP
  • [321] SWAP3
  • [322] SWAP2
  • [323] POP
  • [324] POP
  • [325] JUMP
  • [326] JUMPDEST
  • [327] PUSH1 0x01
  • [328] DUP2
  • [329] DUP2
  • [330] SHR
  • [331] SWAP1
  • [332] DUP3
  • [333] AND
  • [334] DUP1
  • [335] PUSH2 0x01c1
  • [336] JUMPI
  • [337] PUSH1 0x7f
  • [338] DUP3
  • [339] AND
  • [340] SWAP2
  • [341] POP
  • [342] JUMPDEST
  • [343] PUSH1 0x20
  • [344] DUP3
  • [345] LT
  • [346] DUP2
  • [347] SUB
  • [348] PUSH2 0x01df
  • [349] JUMPI
  • [350] PUSH4 0x4e487b71
  • [351] PUSH1 0xe0
  • [352] SHL
  • [353] PUSH0 0x
  • [354] MSTORE
  • [355] PUSH1 0x22
  • [356] PUSH1 0x04
  • [357] MSTORE
  • [358] PUSH1 0x24
  • [359] PUSH0 0x
  • [360] REVERT
  • [361] JUMPDEST
  • [362] POP
  • [363] SWAP2
  • [364] SWAP1
  • [365] POP
  • [366] JUMP
  • [367] 'fe'(Unknown Opcode)
  • [368] LOG2
  • [369] PUSH5 0x6970667358
  • [370] '22'(Unknown Opcode)
  • [371] SLT
  • [372] SHA3
  • [373] 'ec'(Unknown Opcode)
  • [374] 'f6'(Unknown Opcode)
  • [375] 'bd'(Unknown Opcode)
  • [376] SWAP11
  • [377] 'dc'(Unknown Opcode)
  • [378] PUSH12 0xa0bbe5b806825041571dd6ce
  • [379] CALLER
  • [380] GT
  • [381] 'dc'(Unknown Opcode)
  • [382] '1e'(Unknown Opcode)
  • [383] EQ
  • [384] 'bb'(Unknown Opcode)
  • [385] 'be'(Unknown Opcode)
  • [386] 'c4'(Unknown Opcode)
  • [387] ISZERO
  • [388] CALLDATACOPY
  • [389] PUSH7 0x28882064736f6c
  • [390] PUSH4 0x4300081c
  • [391] STOP
  • [392] CALLER