Sepolia Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] ADDRESS
  • [4] SLOAD
  • [5] PUSH1 0x00
  • [6] DUP1
  • [7] DUP1
  • [8] SWAP3
  • [9] CALLDATASIZE
  • [10] DUP3
  • [11] DUP1
  • [12] CALLDATACOPY
  • [13] DUP2
  • [14] CALLDATASIZE
  • [15] SWAP2
  • [16] GAS
  • [17] DELEGATECALL
  • [18] RETURNDATASIZE
  • [19] DUP3
  • [20] DUP1
  • [21] RETURNDATACOPY
  • [22] ISZERO
  • [23] PUSH1 0x20
  • [24] JUMPI
  • [25] RETURNDATASIZE
  • [26] SWAP1
  • [27] RETURN
  • [28] JUMPDEST
  • [29] RETURNDATASIZE
  • [30] SWAP1
  • [31] REVERT
  • [32] 'fe'(Unknown Opcode)
  • [33] LOG2
  • [34] PUSH5 0x6970667358
  • [35] '22'(Unknown Opcode)
  • [36] SLT
  • [37] SHA3
  • [38] LOG0
  • [39] EXTCODESIZE
  • [40] XOR
  • [41] 'dc'(Unknown Opcode)
  • [42] 'e0'(Unknown Opcode)
  • [43] 'be'(Unknown Opcode)
  • [44] SIGNEXTEND
  • [45] '4c'(Unknown Opcode)
  • [46] SWAP11
  • [47] 'fe'(Unknown Opcode)
  • [48] PC
  • [49] 'a9'(Unknown Opcode)
  • [50] 'eb'(Unknown Opcode)
  • [51] DUP6
  • [52] 'c3'(Unknown Opcode)
  • [53] MSTORE
  • [54] SDIV
  • [55] 'e2'(Unknown Opcode)
  • [56] 'cf'(Unknown Opcode)
  • [57] ADDMOD