Sepolia Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x000f
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0034
  • [17] JUMPI
  • [18] PUSH0 0x
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x2e64cec1
  • [24] EQ
  • [25] PUSH2 0x0038
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0x6057361d
  • [29] EQ
  • [30] PUSH2 0x0056
  • [31] JUMPI
  • [32] JUMPDEST
  • [33] PUSH0 0x
  • [34] DUP1
  • [35] REVERT
  • [36] JUMPDEST
  • [37] PUSH2 0x0040
  • [38] PUSH2 0x0072
  • [39] JUMP
  • [40] JUMPDEST
  • [41] PUSH1 0x40
  • [42] MLOAD
  • [43] PUSH2 0x004d
  • [44] SWAP2
  • [45] SWAP1
  • [46] PUSH2 0x009b
  • [47] JUMP
  • [48] JUMPDEST
  • [49] PUSH1 0x40
  • [50] MLOAD
  • [51] DUP1
  • [52] SWAP2
  • [53] SUB
  • [54] SWAP1
  • [55] RETURN
  • [56] JUMPDEST
  • [57] PUSH2 0x0070
  • [58] PUSH1 0x04
  • [59] DUP1
  • [60] CALLDATASIZE
  • [61] SUB
  • [62] DUP2
  • [63] ADD
  • [64] SWAP1
  • [65] PUSH2 0x006b
  • [66] SWAP2
  • [67] SWAP1
  • [68] PUSH2 0x00e2
  • [69] JUMP
  • [70] JUMPDEST
  • [71] PUSH2 0x007a
  • [72] JUMP
  • [73] JUMPDEST
  • [74] STOP
  • [75] JUMPDEST
  • [76] PUSH0 0x
  • [77] DUP1
  • [78] SLOAD
  • [79] SWAP1
  • [80] POP
  • [81] SWAP1
  • [82] JUMP
  • [83] JUMPDEST
  • [84] DUP1
  • [85] PUSH0 0x
  • [86] DUP2
  • [87] SWAP1
  • [88] SSTORE
  • [89] POP
  • [90] POP
  • [91] JUMP
  • [92] JUMPDEST
  • [93] PUSH0 0x
  • [94] DUP2
  • [95] SWAP1
  • [96] POP
  • [97] SWAP2
  • [98] SWAP1
  • [99] POP
  • [100] JUMP
  • [101] JUMPDEST
  • [102] PUSH2 0x0095
  • [103] DUP2
  • [104] PUSH2 0x0083
  • [105] JUMP
  • [106] JUMPDEST
  • [107] DUP3
  • [108] MSTORE
  • [109] POP
  • [110] POP
  • [111] JUMP
  • [112] JUMPDEST
  • [113] PUSH0 0x
  • [114] PUSH1 0x20
  • [115] DUP3
  • [116] ADD
  • [117] SWAP1
  • [118] POP
  • [119] PUSH2 0x00ae
  • [120] PUSH0 0x
  • [121] DUP4
  • [122] ADD
  • [123] DUP5
  • [124] PUSH2 0x008c
  • [125] JUMP
  • [126] JUMPDEST
  • [127] SWAP3
  • [128] SWAP2
  • [129] POP
  • [130] POP
  • [131] JUMP
  • [132] JUMPDEST
  • [133] PUSH0 0x
  • [134] DUP1
  • [135] REVERT
  • [136] JUMPDEST
  • [137] PUSH2 0x00c1
  • [138] DUP2
  • [139] PUSH2 0x0083
  • [140] JUMP
  • [141] JUMPDEST
  • [142] DUP2
  • [143] EQ
  • [144] PUSH2 0x00cb
  • [145] JUMPI
  • [146] PUSH0 0x
  • [147] DUP1
  • [148] REVERT
  • [149] JUMPDEST
  • [150] POP
  • [151] JUMP
  • [152] JUMPDEST
  • [153] PUSH0 0x
  • [154] DUP2
  • [155] CALLDATALOAD
  • [156] SWAP1
  • [157] POP
  • [158] PUSH2 0x00dc
  • [159] DUP2
  • [160] PUSH2 0x00b8
  • [161] JUMP
  • [162] JUMPDEST
  • [163] SWAP3
  • [164] SWAP2
  • [165] POP
  • [166] POP
  • [167] JUMP
  • [168] JUMPDEST
  • [169] PUSH0 0x
  • [170] PUSH1 0x20
  • [171] DUP3
  • [172] DUP5
  • [173] SUB
  • [174] SLT
  • [175] ISZERO
  • [176] PUSH2 0x00f7
  • [177] JUMPI
  • [178] PUSH2 0x00f6
  • [179] PUSH2 0x00b4
  • [180] JUMP
  • [181] JUMPDEST
  • [182] JUMPDEST
  • [183] PUSH0 0x
  • [184] PUSH2 0x0104
  • [185] DUP5
  • [186] DUP3
  • [187] DUP6
  • [188] ADD
  • [189] PUSH2 0x00ce
  • [190] JUMP
  • [191] JUMPDEST
  • [192] SWAP2
  • [193] POP
  • [194] POP
  • [195] SWAP3
  • [196] SWAP2
  • [197] POP
  • [198] POP
  • [199] JUMP
  • [200] 'fe'(Unknown Opcode)
  • [201] LOG2
  • [202] PUSH5 0x6970667358
  • [203] '22'(Unknown Opcode)
  • [204] SLT
  • [205] SHA3
  • [206] SWAP11
  • [207] '0d'(Unknown Opcode)
  • [208] 'd3'(Unknown Opcode)
  • [209] MSTORE8
  • [210] CALLDATASIZE
  • [211] 'af'(Unknown Opcode)
  • [212] CALL
  • [213] 'eb'(Unknown Opcode)
  • [214] RETURNDATACOPY
  • [215] 'eb'(Unknown Opcode)
  • [216] GT
  • [217] 'db'(Unknown Opcode)
  • [218] PUSH23 0xaa60a1427a12c1b92f945ea8c8d1dfa337cf2264736f6c
  • [219] PUSH4 0x4300081a
  • [220] STOP
  • [221] CALLER