Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] PUSH1 0x04
- [4] CALLDATASIZE
- [5] LT
- [6] PUSH2 0x020d
- [7] JUMPI
- [8] PUSH1 0x00
- [9] DUP1
- [10] CALLDATALOAD
- [11] PUSH1 0xe0
- [12] SHR
- [13] PUSH4 0x4f1ef286
- [14] EQ
- [15] PUSH2 0x0023
- [16] JUMPI
- [17] POP
- [18] PUSH2 0x020d
- [19] JUMP
- [20] JUMPDEST
- [21] CALLVALUE
- [22] PUSH2 0x0097
- [23] JUMPI
- [24] PUSH1 0x40
- [25] CALLDATASIZE
- [26] PUSH1 0x03
- [27] NOT
- [28] ADD
- [29] SLT
- [30] PUSH2 0x0097
- [31] JUMPI
- [32] PUSH1 0x04
- [33] CALLDATALOAD
- [34] PUSH1 0x01
- [35] PUSH1 0x01
- [36] PUSH1 0xa0
- [37] SHL
- [38] SUB
- [39] DUP2
- [40] AND
- [41] DUP2
- [42] SUB
- [43] PUSH2 0x0093
- [44] JUMPI
- [45] PUSH1 0x24
- [46] CALLDATALOAD
- [47] SWAP1
- [48] PUSH8 0xffffffffffffffff
- [49] SWAP1
- [50] DUP2
- [51] DUP4
- [52] GT
- [53] PUSH2 0x008f
- [54] JUMPI
- [55] CALLDATASIZE
- [56] PUSH1 0x23
- [57] DUP5
- [58] ADD
- [59] SLT
- [60] ISZERO
- [61] PUSH2 0x008f
- [62] JUMPI
- [63] DUP3
- [64] PUSH1 0x04
- [65] ADD
- [66] CALLDATALOAD
- [67] SWAP2
- [68] DUP3
- [69] GT
- [70] PUSH2 0x008f
- [71] JUMPI
- [72] CALLDATASIZE
- [73] PUSH1 0x24
- [74] DUP4
- [75] DUP6
- [76] ADD
- [77] ADD
- [78] GT
- [79] PUSH2 0x008f
- [80] JUMPI
- [81] PUSH1 0x24
- [82] PUSH2 0x008c
- [83] SWAP4
- [84] ADD
- [85] SWAP1
- [86] PUSH2 0x00f7
- [87] JUMP
- [88] JUMPDEST
- [89] DUP1
- [90] RETURN
- [91] JUMPDEST
- [92] DUP4
- [93] DUP1
- [94] REVERT
- [95] JUMPDEST
- [96] POP
- [97] DUP1
- [98] REVERT
- [99] JUMPDEST
- [100] DUP1
- [101] REVERT
- [102] JUMPDEST
- [103] PUSH4 0x4e487b71
- [104] PUSH1 0xe0
- [105] SHL
- [106] PUSH1 0x00
- [107] MSTORE
- [108] PUSH1 0x41
- [109] PUSH1 0x04
- [110] MSTORE
- [111] PUSH1 0x24
- [112] PUSH1 0x00
- [113] REVERT
- [114] JUMPDEST
- [115] PUSH1 0x40
- [116] MLOAD
- [117] SWAP2
- [118] SWAP1
- [119] PUSH1 0x1f
- [120] ADD
- [121] PUSH1 0x1f
- [122] NOT
- [123] AND
- [124] DUP3
- [125] ADD
- [126] PUSH8 0xffffffffffffffff
- [127] DUP2
- [128] GT
- [129] DUP4
- [130] DUP3
- [131] LT
- [132] OR
- [133] PUSH2 0x00d6
- [134] JUMPI
- [135] PUSH1 0x40
- [136] MSTORE
- [137] JUMP
- [138] JUMPDEST
- [139] PUSH2 0x009a
- [140] JUMP
- [141] JUMPDEST
- [142] PUSH8 0xffffffffffffffff
- [143] DUP2
- [144] GT
- [145] PUSH2 0x00d6
- [146] JUMPI
- [147] PUSH1 0x1f
- [148] ADD
- [149] PUSH1 0x1f
- [150] NOT
- [151] AND
- [152] PUSH1 0x20
- [153] ADD
- [154] SWAP1
- [155] JUMP
- [156] JUMPDEST
- [157] SWAP2
- [158] PUSH1 0x01
- [159] PUSH1 0x01
- [160] PUSH1 0xa0
- [161] SHL
- [162] SUB
- [163] SWAP1
- [164] PUSH32 0x00000000000000000000000090d6bf17d26d975611f20a8e2f15df8eb957526d
- [165] DUP3
- [166] AND
- [167] CALLER
- [168] SUB
- [169] PUSH2 0x01fb
- [170] JUMPI
- [171] PUSH2 0x013b
- [172] PUSH2 0x0136
- [173] DUP3
- [174] PUSH2 0x00db
- [175] JUMP
- [176] JUMPDEST
- [177] PUSH2 0x00b0
- [178] JUMP
- [179] JUMPDEST
- [180] SWAP3
- [181] DUP2
- [182] DUP5
- [183] MSTORE
- [184] CALLDATASIZE
- [185] DUP3
- [186] DUP3
- [187] ADD
- [188] GT
- [189] PUSH2 0x01f6
- [190] JUMPI
- [191] DUP2
- [192] PUSH1 0x00
- [193] SWAP3
- [194] PUSH1 0x20
- [195] SWAP3
- [196] DUP4
- [197] DUP8
- [198] ADD
- [199] CALLDATACOPY
- [200] DUP5
- [201] ADD
- [202] ADD
- [203] MSTORE
- [204] DUP3
- [205] EXTCODESIZE
- [206] ISZERO
- [207] PUSH2 0x01dc
- [208] JUMPI
- [209] DUP3
- [210] AND
- [211] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
- [212] DUP2
- [213] PUSH12 0xffffffffffffffffffffffff
- [214] PUSH1 0xa0
- [215] SHL
- [216] DUP3
- [217] SLOAD
- [218] AND
- [219] OR
- [220] SWAP1
- [221] SSTORE
- [222] PUSH32 0xbc7cd75a20ee27fd9adebab32041f755214dbc6bffa90cc0225b39da2e5c2d3b
- [223] PUSH1 0x00
- [224] DUP1
- [225] LOG2
- [226] DUP1
- [227] MLOAD
- [228] ISZERO
- [229] PUSH2 0x01d0
- [230] JUMPI
- [231] PUSH2 0x01cd
- [232] SWAP2
- [233] PUSH2 0x0272
- [234] JUMP
- [235] JUMPDEST
- [236] POP
- [237] JUMP
- [238] JUMPDEST
- [239] POP
- [240] POP
- [241] PUSH2 0x01da
- [242] PUSH2 0x0259
- [243] JUMP
- [244] JUMPDEST
- [245] JUMP
- [246] JUMPDEST
- [247] PUSH1 0x40
- [248] MLOAD
- [249] PUSH4 0x4c9c8ce3
- [250] PUSH1 0xe0
- [251] SHL
- [252] DUP2
- [253] MSTORE
- [254] SWAP1
- [255] DUP4
- [256] AND
- [257] PUSH1 0x04
- [258] DUP3
- [259] ADD
- [260] MSTORE
- [261] PUSH1 0x24
- [262] SWAP1
- [263] REVERT
- [264] JUMPDEST
- [265] PUSH1 0x00
- [266] DUP1
- [267] REVERT
- [268] JUMPDEST
- [269] PUSH1 0x40
- [270] MLOAD
- [271] PUSH4 0x34ad5dbb
- [272] PUSH1 0xe2
- [273] SHL
- [274] DUP2
- [275] MSTORE
- [276] PUSH1 0x04
- [277] SWAP1
- [278] REVERT
- [279] JUMPDEST
- [280] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
- [281] SLOAD
- [282] PUSH1 0x00
- [283] SWAP1
- [284] DUP2
- [285] SWAP1
- [286] DUP2
- [287] SWAP1
- [288] PUSH1 0x01
- [289] PUSH1 0x01
- [290] PUSH1 0xa0
- [291] SHL
- [292] SUB
- [293] AND
- [294] CALLDATASIZE
- [295] DUP3
- [296] DUP1
- [297] CALLDATACOPY
- [298] DUP2
- [299] CALLDATASIZE
- [300] SWAP2
- [301] GAS
- [302] DELEGATECALL
- [303] RETURNDATASIZE
- [304] DUP3
- [305] DUP1
- [306] RETURNDATACOPY
- [307] ISZERO
- [308] PUSH2 0x0255
- [309] JUMPI
- [310] RETURNDATASIZE
- [311] SWAP1
- [312] RETURN
- [313] JUMPDEST
- [314] RETURNDATASIZE
- [315] SWAP1
- [316] REVERT
- [317] JUMPDEST
- [318] CALLVALUE
- [319] PUSH2 0x0260
- [320] JUMPI
- [321] JUMP
- [322] JUMPDEST
- [323] PUSH1 0x40
- [324] MLOAD
- [325] PUSH4 0xb398979f
- [326] PUSH1 0xe0
- [327] SHL
- [328] DUP2
- [329] MSTORE
- [330] PUSH1 0x04
- [331] SWAP1
- [332] REVERT
- [333] JUMPDEST
- [334] PUSH1 0x00
- [335] DUP1
- [336] PUSH2 0x02a6
- [337] SWAP4
- [338] PUSH1 0x20
- [339] DUP2
- [340] MLOAD
- [341] SWAP2
- [342] ADD
- [343] DUP5
- [344] GAS
- [345] DELEGATECALL
- [346] RETURNDATASIZE
- [347] ISZERO
- [348] PUSH2 0x02a9
- [349] JUMPI
- [350] RETURNDATASIZE
- [351] SWAP2
- [352] PUSH2 0x0296
- [353] PUSH2 0x0136
- [354] DUP5
- [355] PUSH2 0x00db
- [356] JUMP
- [357] JUMPDEST
- [358] SWAP3
- [359] DUP4
- [360] MSTORE
- [361] RETURNDATASIZE
- [362] PUSH1 0x00
- [363] PUSH1 0x20
- [364] DUP6
- [365] ADD
- [366] RETURNDATACOPY
- [367] PUSH2 0x02ad
- [368] JUMP
- [369] JUMPDEST
- [370] SWAP1
- [371] JUMP
- [372] JUMPDEST
- [373] PUSH1 0x60
- [374] SWAP2
- [375] JUMPDEST
- [376] SWAP1
- [377] PUSH2 0x02d4
- [378] JUMPI
- [379] POP
- [380] DUP1
- [381] MLOAD
- [382] ISZERO
- [383] PUSH2 0x02c2
- [384] JUMPI
- [385] DUP1
- [386] MLOAD
- [387] SWAP1
- [388] PUSH1 0x20
- [389] ADD
- [390] REVERT
- [391] JUMPDEST
- [392] PUSH1 0x40
- [393] MLOAD
- [394] PUSH4 0x0a12f521
- [395] PUSH1 0xe1
- [396] SHL
- [397] DUP2
- [398] MSTORE
- [399] PUSH1 0x04
- [400] SWAP1
- [401] REVERT
- [402] JUMPDEST
- [403] DUP2
- [404] MLOAD
- [405] ISZERO
- [406] DUP1
- [407] PUSH2 0x0307
- [408] JUMPI
- [409] JUMPDEST
- [410] PUSH2 0x02e5
- [411] JUMPI
- [412] POP
- [413] SWAP1
- [414] JUMP
- [415] JUMPDEST
- [416] PUSH1 0x40
- [417] MLOAD
- [418] PUSH4 0x9996b315
- [419] PUSH1 0xe0
- [420] SHL
- [421] DUP2
- [422] MSTORE
- [423] PUSH1 0x01
- [424] PUSH1 0x01
- [425] PUSH1 0xa0
- [426] SHL
- [427] SUB
- [428] SWAP1
- [429] SWAP2
- [430] AND
- [431] PUSH1 0x04
- [432] DUP3
- [433] ADD
- [434] MSTORE
- [435] PUSH1 0x24
- [436] SWAP1
- [437] REVERT
- [438] JUMPDEST
- [439] POP
- [440] DUP1
- [441] EXTCODESIZE
- [442] ISZERO
- [443] PUSH2 0x02dd
- [444] JUMP
- [445] 'fe'(Unknown Opcode)
- [446] LOG2
- [447] PUSH5 0x6970667358
- [448] '22'(Unknown Opcode)
- [449] SLT
- [450] SHA3
- [451] GAS
- [452] PUSH0 0x
- [453] BLOBHASH
- [454] 'd4'(Unknown Opcode)
- [455] '22'(Unknown Opcode)
- [456] 'd1'(Unknown Opcode)
- [457] BALANCE
- [458] SDIV
- [459] '2c'(Unknown Opcode)
- [460] SWAP2
- [461] 'a6'(Unknown Opcode)
- [462] 'c9'(Unknown Opcode)
- [463] NOT
- [464] 'c2'(Unknown Opcode)
- [465] PUSH7 0xa5a9dbbbc52835