Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0029
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0xe21f37ce
  • [24] EQ
  • [25] PUSH2 0x002d
  • [26] JUMPI
  • [27] JUMPDEST
  • [28] PUSH0 0x
  • [29] DUP1
  • [30] REVERT
  • [31] JUMPDEST
  • [32] PUSH2 0x0035
  • [33] PUSH2 0x004b
  • [34] JUMP
  • [35] JUMPDEST
  • [36] PUSH1 0x40
  • [37] MLOAD
  • [38] PUSH2 0x0042
  • [39] SWAP2
  • [40] SWAP1
  • [41] PUSH2 0x0160
  • [42] JUMP
  • [43] JUMPDEST
  • [44] PUSH1 0x40
  • [45] MLOAD
  • [46] DUP1
  • [47] SWAP2
  • [48] SUB
  • [49] SWAP1
  • [50] RETURN
  • [51] JUMPDEST
  • [52] PUSH0 0x
  • [53] DUP1
  • [54] SLOAD
  • [55] PUSH2 0x0057
  • [56] SWAP1
  • [57] PUSH2 0x01ad
  • [58] JUMP
  • [59] JUMPDEST
  • [60] DUP1
  • [61] PUSH1 0x1f
  • [62] ADD
  • [63] PUSH1 0x20
  • [64] DUP1
  • [65] SWAP2
  • [66] DIV
  • [67] MUL
  • [68] PUSH1 0x20
  • [69] ADD
  • [70] PUSH1 0x40
  • [71] MLOAD
  • [72] SWAP1
  • [73] DUP2
  • [74] ADD
  • [75] PUSH1 0x40
  • [76] MSTORE
  • [77] DUP1
  • [78] SWAP3
  • [79] SWAP2
  • [80] SWAP1
  • [81] DUP2
  • [82] DUP2
  • [83] MSTORE
  • [84] PUSH1 0x20
  • [85] ADD
  • [86] DUP3
  • [87] DUP1
  • [88] SLOAD
  • [89] PUSH2 0x0083
  • [90] SWAP1
  • [91] PUSH2 0x01ad
  • [92] JUMP
  • [93] JUMPDEST
  • [94] DUP1
  • [95] ISZERO
  • [96] PUSH2 0x00ce
  • [97] JUMPI
  • [98] DUP1
  • [99] PUSH1 0x1f
  • [100] LT
  • [101] PUSH2 0x00a5
  • [102] JUMPI
  • [103] PUSH2 0x0100
  • [104] DUP1
  • [105] DUP4
  • [106] SLOAD
  • [107] DIV
  • [108] MUL
  • [109] DUP4
  • [110] MSTORE
  • [111] SWAP2
  • [112] PUSH1 0x20
  • [113] ADD
  • [114] SWAP2
  • [115] PUSH2 0x00ce
  • [116] JUMP
  • [117] JUMPDEST
  • [118] DUP3
  • [119] ADD
  • [120] SWAP2
  • [121] SWAP1
  • [122] PUSH0 0x
  • [123] MSTORE
  • [124] PUSH1 0x20
  • [125] PUSH0 0x
  • [126] SHA3
  • [127] SWAP1
  • [128] JUMPDEST
  • [129] DUP2
  • [130] SLOAD
  • [131] DUP2
  • [132] MSTORE
  • [133] SWAP1
  • [134] PUSH1 0x01
  • [135] ADD
  • [136] SWAP1
  • [137] PUSH1 0x20
  • [138] ADD
  • [139] DUP1
  • [140] DUP4
  • [141] GT
  • [142] PUSH2 0x00b1
  • [143] JUMPI
  • [144] DUP3
  • [145] SWAP1
  • [146] SUB
  • [147] PUSH1 0x1f
  • [148] AND
  • [149] DUP3
  • [150] ADD
  • [151] SWAP2
  • [152] JUMPDEST
  • [153] POP
  • [154] POP
  • [155] POP
  • [156] POP
  • [157] POP
  • [158] DUP2
  • [159] JUMP
  • [160] JUMPDEST
  • [161] PUSH0 0x
  • [162] DUP2
  • [163] MLOAD
  • [164] SWAP1
  • [165] POP
  • [166] SWAP2
  • [167] SWAP1
  • [168] POP
  • [169] JUMP
  • [170] JUMPDEST
  • [171] PUSH0 0x
  • [172] DUP3
  • [173] DUP3
  • [174] MSTORE
  • [175] PUSH1 0x20
  • [176] DUP3
  • [177] ADD
  • [178] SWAP1
  • [179] POP
  • [180] SWAP3
  • [181] SWAP2
  • [182] POP
  • [183] POP
  • [184] JUMP
  • [185] JUMPDEST
  • [186] PUSH0 0x
  • [187] JUMPDEST
  • [188] DUP4
  • [189] DUP2
  • [190] LT
  • [191] ISZERO
  • [192] PUSH2 0x010d
  • [193] JUMPI
  • [194] DUP1
  • [195] DUP3
  • [196] ADD
  • [197] MLOAD
  • [198] DUP2
  • [199] DUP5
  • [200] ADD
  • [201] MSTORE
  • [202] PUSH1 0x20
  • [203] DUP2
  • [204] ADD
  • [205] SWAP1
  • [206] POP
  • [207] PUSH2 0x00f2
  • [208] JUMP
  • [209] JUMPDEST
  • [210] PUSH0 0x
  • [211] DUP5
  • [212] DUP5
  • [213] ADD
  • [214] MSTORE
  • [215] POP
  • [216] POP
  • [217] POP
  • [218] POP
  • [219] JUMP
  • [220] JUMPDEST
  • [221] PUSH0 0x
  • [222] PUSH1 0x1f
  • [223] NOT
  • [224] PUSH1 0x1f
  • [225] DUP4
  • [226] ADD
  • [227] AND
  • [228] SWAP1
  • [229] POP
  • [230] SWAP2
  • [231] SWAP1
  • [232] POP
  • [233] JUMP
  • [234] JUMPDEST
  • [235] PUSH0 0x
  • [236] PUSH2 0x0132
  • [237] DUP3
  • [238] PUSH2 0x00d6
  • [239] JUMP
  • [240] JUMPDEST
  • [241] PUSH2 0x013c
  • [242] DUP2
  • [243] DUP6
  • [244] PUSH2 0x00e0
  • [245] JUMP
  • [246] JUMPDEST
  • [247] SWAP4
  • [248] POP
  • [249] PUSH2 0x014c
  • [250] DUP2
  • [251] DUP6
  • [252] PUSH1 0x20
  • [253] DUP7
  • [254] ADD
  • [255] PUSH2 0x00f0
  • [256] JUMP
  • [257] JUMPDEST
  • [258] PUSH2 0x0155
  • [259] DUP2
  • [260] PUSH2 0x0118
  • [261] JUMP
  • [262] JUMPDEST
  • [263] DUP5
  • [264] ADD
  • [265] SWAP2
  • [266] POP
  • [267] POP
  • [268] SWAP3
  • [269] SWAP2
  • [270] POP
  • [271] POP
  • [272] JUMP
  • [273] JUMPDEST
  • [274] PUSH0 0x
  • [275] PUSH1 0x20
  • [276] DUP3
  • [277] ADD
  • [278] SWAP1
  • [279] POP
  • [280] DUP2
  • [281] DUP2
  • [282] SUB
  • [283] PUSH0 0x
  • [284] DUP4
  • [285] ADD
  • [286] MSTORE
  • [287] PUSH2 0x0178
  • [288] DUP2
  • [289] DUP5
  • [290] PUSH2 0x0128
  • [291] JUMP
  • [292] JUMPDEST
  • [293] SWAP1
  • [294] POP
  • [295] SWAP3
  • [296] SWAP2
  • [297] POP
  • [298] POP
  • [299] JUMP
  • [300] JUMPDEST
  • [301] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
  • [302] PUSH0 0x
  • [303] MSTORE
  • [304] PUSH1 0x22
  • [305] PUSH1 0x04
  • [306] MSTORE
  • [307] PUSH1 0x24
  • [308] PUSH0 0x
  • [309] REVERT
  • [310] JUMPDEST
  • [311] PUSH0 0x
  • [312] PUSH1 0x02
  • [313] DUP3
  • [314] DIV
  • [315] SWAP1
  • [316] POP
  • [317] PUSH1 0x01
  • [318] DUP3
  • [319] AND
  • [320] DUP1
  • [321] PUSH2 0x01c4
  • [322] JUMPI
  • [323] PUSH1 0x7f
  • [324] DUP3
  • [325] AND
  • [326] SWAP2
  • [327] POP
  • [328] JUMPDEST
  • [329] PUSH1 0x20
  • [330] DUP3
  • [331] LT
  • [332] DUP2
  • [333] SUB
  • [334] PUSH2 0x01d7
  • [335] JUMPI
  • [336] PUSH2 0x01d6
  • [337] PUSH2 0x0180
  • [338] JUMP
  • [339] JUMPDEST
  • [340] JUMPDEST
  • [341] POP
  • [342] SWAP2
  • [343] SWAP1
  • [344] POP
  • [345] JUMP
  • [346] 'fe'(Unknown Opcode)
  • [347] LOG2
  • [348] PUSH5 0x6970667358
  • [349] '22'(Unknown Opcode)
  • [350] SLT
  • [351] SHA3
  • [352] GASLIMIT
  • [353] '23'(Unknown Opcode)
  • [354] SELFDESTRUCT
  • [355] SWAP14
  • [356] NOT
  • [357] DUP10
  • [358] MULMOD
  • [359] 'c9'(Unknown Opcode)
  • [360] CODECOPY
  • [361] STOP
  • [362] CALLDATACOPY
  • [363] BLOCKHASH
  • [364] DUP3
  • [365] 'cc'(Unknown Opcode)
  • [366] SWAP12
  • [367] DUP10
  • [368] 'ea'(Unknown Opcode)
  • [369] BASEFEE
  • [370] DUP3
  • [371] 'e6'(Unknown Opcode)
  • [372] 'ba'(Unknown Opcode)
  • [373] 'dd'(Unknown Opcode)
  • [374] CODESIZE
  • [375] LT
  • [376] 'df'(Unknown Opcode)
  • [377] CALLDATASIZE
  • [378] '2d'(Unknown Opcode)
  • [379] 'b5'(Unknown Opcode)
  • [380] 'ad'(Unknown Opcode)
  • [381] 'ea'(Unknown Opcode)
  • [382] '2f'(Unknown Opcode)
  • [383] MSIZE
  • [384] PUSH5 0x736f6c6343
  • [385] STOP
  • [386] ADDMOD
  • [387] BYTE
  • [388] STOP
  • [389] CALLER