Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x0010
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0057
  • [17] JUMPI
  • [18] PUSH1 0x00
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x3659cfe6
  • [24] EQ
  • [25] PUSH2 0x005c
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0x5c60da1b
  • [29] EQ
  • [30] PUSH2 0x0071
  • [31] JUMPI
  • [32] DUP1
  • [33] PUSH4 0x715018a6
  • [34] EQ
  • [35] PUSH2 0x009a
  • [36] JUMPI
  • [37] DUP1
  • [38] PUSH4 0x8da5cb5b
  • [39] EQ
  • [40] PUSH2 0x00a2
  • [41] JUMPI
  • [42] DUP1
  • [43] PUSH4 0xf2fde38b
  • [44] EQ
  • [45] PUSH2 0x00b3
  • [46] JUMPI
  • [47] JUMPDEST
  • [48] PUSH1 0x00
  • [49] DUP1
  • [50] REVERT
  • [51] JUMPDEST
  • [52] PUSH2 0x006f
  • [53] PUSH2 0x006a
  • [54] CALLDATASIZE
  • [55] PUSH1 0x04
  • [56] PUSH2 0x02ee
  • [57] JUMP
  • [58] JUMPDEST
  • [59] PUSH2 0x00c6
  • [60] JUMP
  • [61] JUMPDEST
  • [62] STOP
  • [63] JUMPDEST
  • [64] PUSH1 0x01
  • [65] SLOAD
  • [66] PUSH1 0x01
  • [67] PUSH1 0x01
  • [68] PUSH1 0xa0
  • [69] SHL
  • [70] SUB
  • [71] AND
  • [72] JUMPDEST
  • [73] PUSH1 0x40
  • [74] MLOAD
  • [75] PUSH1 0x01
  • [76] PUSH1 0x01
  • [77] PUSH1 0xa0
  • [78] SHL
  • [79] SUB
  • [80] SWAP1
  • [81] SWAP2
  • [82] AND
  • [83] DUP2
  • [84] MSTORE
  • [85] PUSH1 0x20
  • [86] ADD
  • [87] PUSH1 0x40
  • [88] MLOAD
  • [89] DUP1
  • [90] SWAP2
  • [91] SUB
  • [92] SWAP1
  • [93] RETURN
  • [94] JUMPDEST
  • [95] PUSH2 0x006f
  • [96] PUSH2 0x010e
  • [97] JUMP
  • [98] JUMPDEST
  • [99] PUSH1 0x00
  • [100] SLOAD
  • [101] PUSH1 0x01
  • [102] PUSH1 0x01
  • [103] PUSH1 0xa0
  • [104] SHL
  • [105] SUB
  • [106] AND
  • [107] PUSH2 0x007e
  • [108] JUMP
  • [109] JUMPDEST
  • [110] PUSH2 0x006f
  • [111] PUSH2 0x00c1
  • [112] CALLDATASIZE
  • [113] PUSH1 0x04
  • [114] PUSH2 0x02ee
  • [115] JUMP
  • [116] JUMPDEST
  • [117] PUSH2 0x0122
  • [118] JUMP
  • [119] JUMPDEST
  • [120] PUSH2 0x00ce
  • [121] PUSH2 0x01af
  • [122] JUMP
  • [123] JUMPDEST
  • [124] PUSH2 0x00d7
  • [125] DUP2
  • [126] PUSH2 0x0209
  • [127] JUMP
  • [128] JUMPDEST
  • [129] PUSH1 0x40
  • [130] MLOAD
  • [131] PUSH1 0x01
  • [132] PUSH1 0x01
  • [133] PUSH1 0xa0
  • [134] SHL
  • [135] SUB
  • [136] DUP3
  • [137] AND
  • [138] SWAP1
  • [139] PUSH32 0xbc7cd75a20ee27fd9adebab32041f755214dbc6bffa90cc0225b39da2e5c2d3b
  • [140] SWAP1
  • [141] PUSH1 0x00
  • [142] SWAP1
  • [143] LOG2
  • [144] POP
  • [145] JUMP
  • [146] JUMPDEST
  • [147] PUSH2 0x0116
  • [148] PUSH2 0x01af
  • [149] JUMP
  • [150] JUMPDEST
  • [151] PUSH2 0x0120
  • [152] PUSH1 0x00
  • [153] PUSH2 0x029e
  • [154] JUMP
  • [155] JUMPDEST
  • [156] JUMP
  • [157] JUMPDEST
  • [158] PUSH2 0x012a
  • [159] PUSH2 0x01af
  • [160] JUMP
  • [161] JUMPDEST
  • [162] PUSH1 0x01
  • [163] PUSH1 0x01
  • [164] PUSH1 0xa0
  • [165] SHL
  • [166] SUB
  • [167] DUP2
  • [168] AND
  • [169] PUSH2 0x0194
  • [170] JUMPI
  • [171] PUSH1 0x40
  • [172] MLOAD
  • [173] PUSH3 0x461bcd
  • [174] PUSH1 0xe5
  • [175] SHL
  • [176] DUP2
  • [177] MSTORE
  • [178] PUSH1 0x20
  • [179] PUSH1 0x04
  • [180] DUP3
  • [181] ADD
  • [182] MSTORE
  • [183] PUSH1 0x26
  • [184] PUSH1 0x24
  • [185] DUP3
  • [186] ADD
  • [187] MSTORE
  • [188] PUSH32 0x4f776e61626c653a206e6577206f776e657220697320746865207a65726f2061
  • [189] PUSH1 0x44
  • [190] DUP3
  • [191] ADD
  • [192] MSTORE
  • [193] PUSH6 0x646472657373
  • [194] PUSH1 0xd0
  • [195] SHL
  • [196] PUSH1 0x64
  • [197] DUP3
  • [198] ADD
  • [199] MSTORE
  • [200] PUSH1 0x84
  • [201] ADD
  • [202] JUMPDEST
  • [203] PUSH1 0x40
  • [204] MLOAD
  • [205] DUP1
  • [206] SWAP2
  • [207] SUB
  • [208] SWAP1
  • [209] REVERT
  • [210] JUMPDEST
  • [211] PUSH2 0x019d
  • [212] DUP2
  • [213] PUSH2 0x029e
  • [214] JUMP
  • [215] JUMPDEST
  • [216] POP
  • [217] JUMP
  • [218] JUMPDEST
  • [219] PUSH1 0x01
  • [220] PUSH1 0x01
  • [221] PUSH1 0xa0
  • [222] SHL
  • [223] SUB
  • [224] AND
  • [225] EXTCODESIZE
  • [226] ISZERO
  • [227] ISZERO
  • [228] SWAP1
  • [229] JUMP
  • [230] JUMPDEST
  • [231] PUSH1 0x00
  • [232] SLOAD
  • [233] PUSH1 0x01
  • [234] PUSH1 0x01
  • [235] PUSH1 0xa0
  • [236] SHL
  • [237] SUB
  • [238] AND
  • [239] CALLER
  • [240] EQ
  • [241] PUSH2 0x0120
  • [242] JUMPI
  • [243] PUSH1 0x40
  • [244] MLOAD
  • [245] PUSH3 0x461bcd
  • [246] PUSH1 0xe5
  • [247] SHL
  • [248] DUP2
  • [249] MSTORE
  • [250] PUSH1 0x20
  • [251] PUSH1 0x04
  • [252] DUP3
  • [253] ADD
  • [254] DUP2
  • [255] SWAP1
  • [256] MSTORE
  • [257] PUSH1 0x24
  • [258] DUP3
  • [259] ADD
  • [260] MSTORE
  • [261] PUSH32 0x4f776e61626c653a2063616c6c6572206973206e6f7420746865206f776e6572
  • [262] PUSH1 0x44
  • [263] DUP3
  • [264] ADD
  • [265] MSTORE
  • [266] PUSH1 0x64
  • [267] ADD
  • [268] PUSH2 0x018b
  • [269] JUMP
  • [270] JUMPDEST
  • [271] PUSH1 0x01
  • [272] PUSH1 0x01
  • [273] PUSH1 0xa0
  • [274] SHL
  • [275] SUB
  • [276] DUP2
  • [277] AND
  • [278] EXTCODESIZE
  • [279] PUSH2 0x027c
  • [280] JUMPI
  • [281] PUSH1 0x40
  • [282] MLOAD
  • [283] PUSH3 0x461bcd
  • [284] PUSH1 0xe5
  • [285] SHL
  • [286] DUP2
  • [287] MSTORE
  • [288] PUSH1 0x20
  • [289] PUSH1 0x04
  • [290] DUP3
  • [291] ADD
  • [292] MSTORE
  • [293] PUSH1 0x33
  • [294] PUSH1 0x24
  • [295] DUP3
  • [296] ADD
  • [297] MSTORE
  • [298] PUSH32 0x5570677261646561626c65426561636f6e3a20696d706c656d656e746174696f
  • [299] PUSH1 0x44
  • [300] DUP3
  • [301] ADD
  • [302] MSTORE
  • [303] PUSH19 0x1b881a5cc81b9bdd08184818dbdb9d1c9858dd
  • [304] PUSH1 0x6a
  • [305] SHL
  • [306] PUSH1 0x64
  • [307] DUP3
  • [308] ADD
  • [309] MSTORE
  • [310] PUSH1 0x84
  • [311] ADD
  • [312] PUSH2 0x018b
  • [313] JUMP
  • [314] JUMPDEST
  • [315] PUSH1 0x01
  • [316] DUP1
  • [317] SLOAD
  • [318] PUSH1 0x01
  • [319] PUSH1 0x01
  • [320] PUSH1 0xa0
  • [321] SHL
  • [322] SUB
  • [323] NOT
  • [324] AND
  • [325] PUSH1 0x01
  • [326] PUSH1 0x01
  • [327] PUSH1 0xa0
  • [328] SHL
  • [329] SUB
  • [330] SWAP3
  • [331] SWAP1
  • [332] SWAP3
  • [333] AND
  • [334] SWAP2
  • [335] SWAP1
  • [336] SWAP2
  • [337] OR
  • [338] SWAP1
  • [339] SSTORE
  • [340] JUMP
  • [341] JUMPDEST
  • [342] PUSH1 0x00
  • [343] DUP1
  • [344] SLOAD
  • [345] PUSH1 0x01
  • [346] PUSH1 0x01
  • [347] PUSH1 0xa0
  • [348] SHL
  • [349] SUB
  • [350] DUP4
  • [351] DUP2
  • [352] AND
  • [353] PUSH1 0x01
  • [354] PUSH1 0x01
  • [355] PUSH1 0xa0
  • [356] SHL
  • [357] SUB
  • [358] NOT
  • [359] DUP4
  • [360] AND
  • [361] DUP2
  • [362] OR
  • [363] DUP5
  • [364] SSTORE
  • [365] PUSH1 0x40
  • [366] MLOAD
  • [367] SWAP2
  • [368] SWAP1
  • [369] SWAP3
  • [370] AND
  • [371] SWAP3
  • [372] DUP4
  • [373] SWAP2
  • [374] PUSH32 0x8be0079c531659141344cd1fd0a4f28419497f9722a3daafe3b4186f6b6457e0
  • [375] SWAP2
  • [376] SWAP1
  • [377] LOG3
  • [378] POP
  • [379] POP
  • [380] JUMP
  • [381] JUMPDEST
  • [382] PUSH1 0x00
  • [383] PUSH1 0x20
  • [384] DUP3
  • [385] DUP5
  • [386] SUB
  • [387] SLT
  • [388] ISZERO
  • [389] PUSH2 0x0300
  • [390] JUMPI
  • [391] PUSH1 0x00
  • [392] DUP1
  • [393] REVERT
  • [394] JUMPDEST
  • [395] DUP2
  • [396] CALLDATALOAD
  • [397] PUSH1 0x01
  • [398] PUSH1 0x01
  • [399] PUSH1 0xa0
  • [400] SHL
  • [401] SUB
  • [402] DUP2
  • [403] AND
  • [404] DUP2
  • [405] EQ
  • [406] PUSH2 0x0317
  • [407] JUMPI
  • [408] PUSH1 0x00
  • [409] DUP1
  • [410] REVERT
  • [411] JUMPDEST
  • [412] SWAP4
  • [413] SWAP3
  • [414] POP
  • [415] POP
  • [416] POP
  • [417] JUMP
  • [418] 'fe'(Unknown Opcode)
  • [419] LOG2
  • [420] PUSH5 0x6970667358
  • [421] '22'(Unknown Opcode)
  • [422] SLT
  • [423] SHA3
  • [424] CALLDATACOPY
  • [425] CREATE2
  • [426] 'e7'(Unknown Opcode)
  • [427] PUSH2 0xa584
  • [428] 'b5'(Unknown Opcode)
  • [429] 'cf'(Unknown Opcode)
  • [430] 'ed'(Unknown Opcode)
  • [431] 'fe'(Unknown Opcode)
  • [432] 'dc'(Unknown Opcode)
  • [433] 'ac'(Unknown Opcode)
  • [434] 'dd'(Unknown Opcode)
  • [435] CALLDATALOAD
  • [436] 'de'(Unknown Opcode)
  • [437] EQ
  • [438] '28'(Unknown Opcode)
  • [439] PUSH19 0x479851fbaecf66f55a175ffa1d1d64736f6c63
  • [440] NUMBER
  • [441] STOP
  • [442] ADDMOD
  • [443] MULMOD
  • [444] STOP
  • [445] CALLER