S Price: $0.46206 (+1.21%)
    /

    Tools

    Bytecode to Opcode Disassembler

    Attempts to decode the low level Contract Bytecodes to Opcodes.

    Decoded Bytecode:
    • [0] PUSH1 0x80
    • [1] PUSH1 0x40
    • [2] MSTORE
    • [3] PUSH1 0x0a
    • [4] PUSH1 0x0c
    • [5] JUMP
    • [6] JUMPDEST
    • [7] STOP
    • [8] JUMPDEST
    • [9] PUSH1 0x18
    • [10] PUSH1 0x14
    • [11] PUSH1 0x1a
    • [12] JUMP
    • [13] JUMPDEST
    • [14] PUSH1 0xa0
    • [15] JUMP
    • [16] JUMPDEST
    • [17] JUMP
    • [18] JUMPDEST
    • [19] PUSH1 0x00
    • [20] PUSH32 0x000000000000000000000000dc76e4fce40c8224d6bbc7dd733165a8a07dce0d
    • [21] PUSH1 0x01
    • [22] PUSH1 0x01
    • [23] PUSH1 0xa0
    • [24] SHL
    • [25] SUB
    • [26] AND
    • [27] PUSH4 0x5c60da1b
    • [28] PUSH1 0x40
    • [29] MLOAD
    • [30] DUP2
    • [31] PUSH4 0xffffffff
    • [32] AND
    • [33] PUSH1 0xe0
    • [34] SHL
    • [35] DUP2
    • [36] MSTORE
    • [37] PUSH1 0x04
    • [38] ADD
    • [39] PUSH1 0x20
    • [40] PUSH1 0x40
    • [41] MLOAD
    • [42] DUP1
    • [43] DUP4
    • [44] SUB
    • [45] DUP2
    • [46] DUP7
    • [47] GAS
    • [48] STATICCALL
    • [49] ISZERO
    • [50] DUP1
    • [51] ISZERO
    • [52] PUSH1 0x79
    • [53] JUMPI
    • [54] RETURNDATASIZE
    • [55] PUSH1 0x00
    • [56] DUP1
    • [57] RETURNDATACOPY
    • [58] RETURNDATASIZE
    • [59] PUSH1 0x00
    • [60] REVERT
    • [61] JUMPDEST
    • [62] POP
    • [63] POP
    • [64] POP
    • [65] POP
    • [66] PUSH1 0x40
    • [67] MLOAD
    • [68] RETURNDATASIZE
    • [69] PUSH1 0x1f
    • [70] NOT
    • [71] PUSH1 0x1f
    • [72] DUP3
    • [73] ADD
    • [74] AND
    • [75] DUP3
    • [76] ADD
    • [77] DUP1
    • [78] PUSH1 0x40
    • [79] MSTORE
    • [80] POP
    • [81] DUP2
    • [82] ADD
    • [83] SWAP1
    • [84] PUSH1 0x9b
    • [85] SWAP2
    • [86] SWAP1
    • [87] PUSH1 0xc3
    • [88] JUMP
    • [89] JUMPDEST
    • [90] SWAP1
    • [91] POP
    • [92] SWAP1
    • [93] JUMP
    • [94] JUMPDEST
    • [95] CALLDATASIZE
    • [96] PUSH1 0x00
    • [97] DUP1
    • [98] CALLDATACOPY
    • [99] PUSH1 0x00
    • [100] DUP1
    • [101] CALLDATASIZE
    • [102] PUSH1 0x00
    • [103] DUP5
    • [104] GAS
    • [105] DELEGATECALL
    • [106] RETURNDATASIZE
    • [107] PUSH1 0x00
    • [108] DUP1
    • [109] RETURNDATACOPY
    • [110] DUP1
    • [111] DUP1
    • [112] ISZERO
    • [113] PUSH1 0xbe
    • [114] JUMPI
    • [115] RETURNDATASIZE
    • [116] PUSH1 0x00
    • [117] RETURN
    • [118] JUMPDEST
    • [119] RETURNDATASIZE
    • [120] PUSH1 0x00
    • [121] REVERT
    • [122] JUMPDEST
    • [123] PUSH1 0x00
    • [124] PUSH1 0x20
    • [125] DUP3
    • [126] DUP5
    • [127] SUB
    • [128] SLT
    • [129] ISZERO
    • [130] PUSH1 0xd4
    • [131] JUMPI
    • [132] PUSH1 0x00
    • [133] DUP1
    • [134] REVERT
    • [135] JUMPDEST
    • [136] DUP2
    • [137] MLOAD
    • [138] PUSH1 0x01
    • [139] PUSH1 0x01
    • [140] PUSH1 0xa0
    • [141] SHL
    • [142] SUB
    • [143] DUP2
    • [144] AND
    • [145] DUP2
    • [146] EQ
    • [147] PUSH1 0xea
    • [148] JUMPI
    • [149] PUSH1 0x00
    • [150] DUP1
    • [151] REVERT
    • [152] JUMPDEST
    • [153] SWAP4
    • [154] SWAP3
    • [155] POP
    • [156] POP
    • [157] POP
    • [158] JUMP
    • [159] 'fe'(Unknown Opcode)
    • [160] LOG2
    • [161] PUSH5 0x6970667358
    • [162] '22'(Unknown Opcode)
    • [163] SLT
    • [164] SHA3
    • [165] SWAP4
    • [166] PUSH2 0xfcf5
    • [167] 'd2'(Unknown Opcode)
    • [168] DUP11
    • [169] DUP9
    • [170] 'bb'(Unknown Opcode)
    • [171] SWAP15
    • [172] 'c3'(Unknown Opcode)
    • [173] TSTORE
    • [174] 'c8'(Unknown Opcode)
    • [175] '29'(Unknown Opcode)
    • [176] DUP3
    • [177] 'b2'(Unknown Opcode)
    • [178] CALLDATACOPY
    • [179] SHR
    • [180] 'ea'(Unknown Opcode)
    • [181] DUP12
    • [182] GASLIMIT
    • [183] PUSH17 0xf9c9c84db0fb0c92f5ae1064736f6c6343
    • [184] STOP
    • [185] ADDMOD
    • [186] OR
    • [187] STOP
    • [188] CALLER