Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLVALUE
- [4] DUP1
- [5] ISZERO
- [6] PUSH2 0x000f
- [7] JUMPI
- [8] PUSH0 0x
- [9] PUSH0 0x
- [10] REVERT
- [11] JUMPDEST
- [12] POP
- [13] PUSH1 0x04
- [14] CALLDATASIZE
- [15] LT
- [16] PUSH2 0x0034
- [17] JUMPI
- [18] PUSH0 0x
- [19] CALLDATALOAD
- [20] PUSH1 0xe0
- [21] SHR
- [22] DUP1
- [23] PUSH4 0xcfae3217
- [24] EQ
- [25] PUSH2 0x0038
- [26] JUMPI
- [27] DUP1
- [28] PUSH4 0xef690cc0
- [29] EQ
- [30] PUSH2 0x0056
- [31] JUMPI
- [32] JUMPDEST
- [33] PUSH0 0x
- [34] PUSH0 0x
- [35] REVERT
- [36] JUMPDEST
- [37] PUSH2 0x0040
- [38] PUSH2 0x005e
- [39] JUMP
- [40] JUMPDEST
- [41] PUSH1 0x40
- [42] MLOAD
- [43] PUSH2 0x004d
- [44] SWAP2
- [45] SWAP1
- [46] PUSH2 0x0178
- [47] JUMP
- [48] JUMPDEST
- [49] PUSH1 0x40
- [50] MLOAD
- [51] DUP1
- [52] SWAP2
- [53] SUB
- [54] SWAP1
- [55] RETURN
- [56] JUMPDEST
- [57] PUSH2 0x0040
- [58] PUSH2 0x00ed
- [59] JUMP
- [60] JUMPDEST
- [61] PUSH1 0x60
- [62] PUSH0 0x
- [63] DUP1
- [64] SLOAD
- [65] PUSH2 0x006c
- [66] SWAP1
- [67] PUSH2 0x01ad
- [68] JUMP
- [69] JUMPDEST
- [70] DUP1
- [71] PUSH1 0x1f
- [72] ADD
- [73] PUSH1 0x20
- [74] DUP1
- [75] SWAP2
- [76] DIV
- [77] MUL
- [78] PUSH1 0x20
- [79] ADD
- [80] PUSH1 0x40
- [81] MLOAD
- [82] SWAP1
- [83] DUP2
- [84] ADD
- [85] PUSH1 0x40
- [86] MSTORE
- [87] DUP1
- [88] SWAP3
- [89] SWAP2
- [90] SWAP1
- [91] DUP2
- [92] DUP2
- [93] MSTORE
- [94] PUSH1 0x20
- [95] ADD
- [96] DUP3
- [97] DUP1
- [98] SLOAD
- [99] PUSH2 0x0098
- [100] SWAP1
- [101] PUSH2 0x01ad
- [102] JUMP
- [103] JUMPDEST
- [104] DUP1
- [105] ISZERO
- [106] PUSH2 0x00e3
- [107] JUMPI
- [108] DUP1
- [109] PUSH1 0x1f
- [110] LT
- [111] PUSH2 0x00ba
- [112] JUMPI
- [113] PUSH2 0x0100
- [114] DUP1
- [115] DUP4
- [116] SLOAD
- [117] DIV
- [118] MUL
- [119] DUP4
- [120] MSTORE
- [121] SWAP2
- [122] PUSH1 0x20
- [123] ADD
- [124] SWAP2
- [125] PUSH2 0x00e3
- [126] JUMP
- [127] JUMPDEST
- [128] DUP3
- [129] ADD
- [130] SWAP2
- [131] SWAP1
- [132] PUSH0 0x
- [133] MSTORE
- [134] PUSH1 0x20
- [135] PUSH0 0x
- [136] SHA3
- [137] SWAP1
- [138] JUMPDEST
- [139] DUP2
- [140] SLOAD
- [141] DUP2
- [142] MSTORE
- [143] SWAP1
- [144] PUSH1 0x01
- [145] ADD
- [146] SWAP1
- [147] PUSH1 0x20
- [148] ADD
- [149] DUP1
- [150] DUP4
- [151] GT
- [152] PUSH2 0x00c6
- [153] JUMPI
- [154] DUP3
- [155] SWAP1
- [156] SUB
- [157] PUSH1 0x1f
- [158] AND
- [159] DUP3
- [160] ADD
- [161] SWAP2
- [162] JUMPDEST
- [163] POP
- [164] POP
- [165] POP
- [166] POP
- [167] POP
- [168] SWAP1
- [169] POP
- [170] SWAP1
- [171] JUMP
- [172] JUMPDEST
- [173] PUSH0 0x
- [174] DUP1
- [175] SLOAD
- [176] PUSH2 0x00f9
- [177] SWAP1
- [178] PUSH2 0x01ad
- [179] JUMP
- [180] JUMPDEST
- [181] DUP1
- [182] PUSH1 0x1f
- [183] ADD
- [184] PUSH1 0x20
- [185] DUP1
- [186] SWAP2
- [187] DIV
- [188] MUL
- [189] PUSH1 0x20
- [190] ADD
- [191] PUSH1 0x40
- [192] MLOAD
- [193] SWAP1
- [194] DUP2
- [195] ADD
- [196] PUSH1 0x40
- [197] MSTORE
- [198] DUP1
- [199] SWAP3
- [200] SWAP2
- [201] SWAP1
- [202] DUP2
- [203] DUP2
- [204] MSTORE
- [205] PUSH1 0x20
- [206] ADD
- [207] DUP3
- [208] DUP1
- [209] SLOAD
- [210] PUSH2 0x0125
- [211] SWAP1
- [212] PUSH2 0x01ad
- [213] JUMP
- [214] JUMPDEST
- [215] DUP1
- [216] ISZERO
- [217] PUSH2 0x0170
- [218] JUMPI
- [219] DUP1
- [220] PUSH1 0x1f
- [221] LT
- [222] PUSH2 0x0147
- [223] JUMPI
- [224] PUSH2 0x0100
- [225] DUP1
- [226] DUP4
- [227] SLOAD
- [228] DIV
- [229] MUL
- [230] DUP4
- [231] MSTORE
- [232] SWAP2
- [233] PUSH1 0x20
- [234] ADD
- [235] SWAP2
- [236] PUSH2 0x0170
- [237] JUMP
- [238] JUMPDEST
- [239] DUP3
- [240] ADD
- [241] SWAP2
- [242] SWAP1
- [243] PUSH0 0x
- [244] MSTORE
- [245] PUSH1 0x20
- [246] PUSH0 0x
- [247] SHA3
- [248] SWAP1
- [249] JUMPDEST
- [250] DUP2
- [251] SLOAD
- [252] DUP2
- [253] MSTORE
- [254] SWAP1
- [255] PUSH1 0x01
- [256] ADD
- [257] SWAP1
- [258] PUSH1 0x20
- [259] ADD
- [260] DUP1
- [261] DUP4
- [262] GT
- [263] PUSH2 0x0153
- [264] JUMPI
- [265] DUP3
- [266] SWAP1
- [267] SUB
- [268] PUSH1 0x1f
- [269] AND
- [270] DUP3
- [271] ADD
- [272] SWAP2
- [273] JUMPDEST
- [274] POP
- [275] POP
- [276] POP
- [277] POP
- [278] POP
- [279] DUP2
- [280] JUMP
- [281] JUMPDEST
- [282] PUSH1 0x20
- [283] DUP2
- [284] MSTORE
- [285] PUSH0 0x
- [286] DUP3
- [287] MLOAD
- [288] DUP1
- [289] PUSH1 0x20
- [290] DUP5
- [291] ADD
- [292] MSTORE
- [293] DUP1
- [294] PUSH1 0x20
- [295] DUP6
- [296] ADD
- [297] PUSH1 0x40
- [298] DUP6
- [299] ADD
- [300] MCOPY
- [301] PUSH0 0x
- [302] PUSH1 0x40
- [303] DUP3
- [304] DUP6
- [305] ADD
- [306] ADD
- [307] MSTORE
- [308] PUSH1 0x40
- [309] PUSH1 0x1f
- [310] NOT
- [311] PUSH1 0x1f
- [312] DUP4
- [313] ADD
- [314] AND
- [315] DUP5
- [316] ADD
- [317] ADD
- [318] SWAP2
- [319] POP
- [320] POP
- [321] SWAP3
- [322] SWAP2
- [323] POP
- [324] POP
- [325] JUMP
- [326] JUMPDEST
- [327] PUSH1 0x01
- [328] DUP2
- [329] DUP2
- [330] SHR
- [331] SWAP1
- [332] DUP3
- [333] AND
- [334] DUP1
- [335] PUSH2 0x01c1
- [336] JUMPI
- [337] PUSH1 0x7f
- [338] DUP3
- [339] AND
- [340] SWAP2
- [341] POP
- [342] JUMPDEST
- [343] PUSH1 0x20
- [344] DUP3
- [345] LT
- [346] DUP2
- [347] SUB
- [348] PUSH2 0x01df
- [349] JUMPI
- [350] PUSH4 0x4e487b71
- [351] PUSH1 0xe0
- [352] SHL
- [353] PUSH0 0x
- [354] MSTORE
- [355] PUSH1 0x22
- [356] PUSH1 0x04
- [357] MSTORE
- [358] PUSH1 0x24
- [359] PUSH0 0x
- [360] REVERT
- [361] JUMPDEST
- [362] POP
- [363] SWAP2
- [364] SWAP1
- [365] POP
- [366] JUMP
- [367] 'fe'(Unknown Opcode)
- [368] LOG2
- [369] PUSH5 0x6970667358
- [370] '22'(Unknown Opcode)
- [371] SLT
- [372] SHA3
- [373] 'ec'(Unknown Opcode)
- [374] 'f6'(Unknown Opcode)
- [375] 'bd'(Unknown Opcode)
- [376] SWAP11
- [377] 'dc'(Unknown Opcode)
- [378] PUSH12 0xa0bbe5b806825041571dd6ce
- [379] CALLER
- [380] GT
- [381] 'dc'(Unknown Opcode)
- [382] '1e'(Unknown Opcode)
- [383] EQ
- [384] 'bb'(Unknown Opcode)
- [385] 'be'(Unknown Opcode)
- [386] 'c4'(Unknown Opcode)
- [387] ISZERO
- [388] CALLDATACOPY
- [389] PUSH7 0x28882064736f6c
- [390] PUSH4 0x4300081c
- [391] STOP
- [392] CALLER