Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] DUP1
- [2] PUSH1 0x40
- [3] MSTORE
- [4] PUSH1 0x04
- [5] CALLDATASIZE
- [6] LT
- [7] ISZERO
- [8] PUSH2 0x0013
- [9] JUMPI
- [10] PUSH1 0x00
- [11] DUP1
- [12] REVERT
- [13] JUMPDEST
- [14] PUSH1 0x00
- [15] CALLDATALOAD
- [16] PUSH1 0xe0
- [17] SHR
- [18] PUSH4 0xdf791e50
- [19] EQ
- [20] PUSH2 0x0028
- [21] JUMPI
- [22] PUSH1 0x00
- [23] DUP1
- [24] REVERT
- [25] JUMPDEST
- [26] PUSH1 0x60
- [27] CALLDATASIZE
- [28] PUSH1 0x03
- [29] NOT
- [30] ADD
- [31] SLT
- [32] PUSH2 0x01e7
- [33] JUMPI
- [34] PUSH1 0x04
- [35] CALLDATALOAD
- [36] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [37] DUP2
- [38] AND
- [39] DUP1
- [40] SWAP2
- [41] SUB
- [42] PUSH2 0x01e7
- [43] JUMPI
- [44] PUSH1 0x24
- [45] CALLDATALOAD
- [46] SWAP2
- [47] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [48] DUP4
- [49] AND
- [50] DUP1
- [51] SWAP4
- [52] SUB
- [53] PUSH2 0x01e7
- [54] JUMPI
- [55] PUSH1 0x44
- [56] CALLDATALOAD
- [57] SWAP1
- [58] PUSH32 0x23b872dd00000000000000000000000000000000000000000000000000000000
- [59] DUP2
- [60] MSTORE
- [61] CALLER
- [62] PUSH1 0x04
- [63] DUP3
- [64] ADD
- [65] MSTORE
- [66] ADDRESS
- [67] PUSH1 0x24
- [68] DUP3
- [69] ADD
- [70] MSTORE
- [71] DUP2
- [72] PUSH1 0x44
- [73] DUP3
- [74] ADD
- [75] MSTORE
- [76] PUSH1 0x20
- [77] DUP2
- [78] PUSH1 0x64
- [79] DUP2
- [80] PUSH1 0x00
- [81] DUP8
- [82] GAS
- [83] CALL
- [84] DUP1
- [85] ISZERO
- [86] PUSH2 0x01f3
- [87] JUMPI
- [88] PUSH2 0x022a
- [89] JUMPI
- [90] JUMPDEST
- [91] POP
- [92] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [93] PUSH1 0x00
- [94] SLOAD
- [95] AND
- [96] SWAP2
- [97] PUSH1 0x40
- [98] MLOAD
- [99] SWAP3
- [100] PUSH32 0x095ea7b300000000000000000000000000000000000000000000000000000000
- [101] DUP5
- [102] MSTORE
- [103] PUSH1 0x04
- [104] DUP5
- [105] ADD
- [106] MSTORE
- [107] DUP2
- [108] PUSH1 0x24
- [109] DUP5
- [110] ADD
- [111] MSTORE
- [112] PUSH1 0x20
- [113] DUP4
- [114] PUSH1 0x44
- [115] DUP2
- [116] PUSH1 0x00
- [117] DUP6
- [118] GAS
- [119] CALL
- [120] SWAP1
- [121] DUP2
- [122] ISZERO
- [123] PUSH2 0x01f3
- [124] JUMPI
- [125] PUSH1 0x20
- [126] SWAP4
- [127] PUSH2 0x0104
- [128] SWAP3
- [129] PUSH2 0x01ff
- [130] JUMPI
- [131] JUMPDEST
- [132] POP
- [133] PUSH1 0x00
- [134] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [135] DUP2
- [136] SLOAD
- [137] AND
- [138] PUSH1 0x40
- [139] MLOAD
- [140] SWAP7
- [141] DUP8
- [142] SWAP6
- [143] DUP7
- [144] SWAP5
- [145] PUSH32 0x5f3bd1c800000000000000000000000000000000000000000000000000000000
- [146] DUP7
- [147] MSTORE
- [148] PUSH1 0x04
- [149] DUP7
- [150] ADD
- [151] MSTORE
- [152] PUSH1 0x24
- [153] DUP6
- [154] ADD
- [155] MSTORE
- [156] CALLER
- [157] PUSH1 0x44
- [158] DUP6
- [159] ADD
- [160] MSTORE
- [161] PUSH1 0x64
- [162] DUP5
- [163] ADD
- [164] MSTORE
- [165] DUP2
- [166] PUSH1 0x84
- [167] DUP5
- [168] ADD
- [169] MSTORE
- [170] PUSH20 0x85cd07ea01423b1e937929b44e4ad8c40bbb5e71
- [171] PUSH1 0xa4
- [172] DUP5
- [173] ADD
- [174] MSTORE
- [175] PUSH1 0xe0
- [176] PUSH1 0xc4
- [177] DUP5
- [178] ADD
- [179] MSTORE
- [180] DUP2
- [181] PUSH1 0xe4
- [182] DUP5
- [183] ADD
- [184] MSTORE
- [185] GAS
- [186] CALL
- [187] DUP1
- [188] ISZERO
- [189] PUSH2 0x01f3
- [190] JUMPI
- [191] PUSH2 0x01c7
- [192] JUMPI
- [193] STOP
- [194] JUMPDEST
- [195] PUSH1 0x20
- [196] SWAP1
- [197] DUP2
- [198] RETURNDATASIZE
- [199] DUP4
- [200] GT
- [201] PUSH2 0x01ec
- [202] JUMPI
- [203] JUMPDEST
- [204] PUSH2 0x01dd
- [205] DUP2
- [206] DUP4
- [207] PUSH2 0x0247
- [208] JUMP
- [209] JUMPDEST
- [210] DUP2
- [211] ADD
- [212] SUB
- [213] SLT
- [214] PUSH2 0x01e7
- [215] JUMPI
- [216] STOP
- [217] JUMPDEST
- [218] PUSH1 0x00
- [219] DUP1
- [220] REVERT
- [221] JUMPDEST
- [222] POP
- [223] RETURNDATASIZE
- [224] PUSH2 0x01d3
- [225] JUMP
- [226] JUMPDEST
- [227] PUSH1 0x40
- [228] MLOAD
- [229] RETURNDATASIZE
- [230] PUSH1 0x00
- [231] DUP3
- [232] RETURNDATACOPY
- [233] RETURNDATASIZE
- [234] SWAP1
- [235] REVERT
- [236] JUMPDEST
- [237] PUSH2 0x021e
- [238] SWAP1
- [239] DUP6
- [240] RETURNDATASIZE
- [241] DUP8
- [242] GT
- [243] PUSH2 0x0223
- [244] JUMPI
- [245] JUMPDEST
- [246] PUSH2 0x0216
- [247] DUP2
- [248] DUP4
- [249] PUSH2 0x0247
- [250] JUMP
- [251] JUMPDEST
- [252] DUP2
- [253] ADD
- [254] SWAP1
- [255] PUSH2 0x0298
- [256] JUMP
- [257] JUMPDEST
- [258] PUSH2 0x0131
- [259] JUMP
- [260] JUMPDEST
- [261] POP
- [262] RETURNDATASIZE
- [263] PUSH2 0x020c
- [264] JUMP
- [265] JUMPDEST
- [266] PUSH2 0x0242
- [267] SWAP1
- [268] PUSH1 0x20
- [269] RETURNDATASIZE
- [270] PUSH1 0x20
- [271] GT
- [272] PUSH2 0x0223
- [273] JUMPI
- [274] PUSH2 0x0216
- [275] DUP2
- [276] DUP4
- [277] PUSH2 0x0247
- [278] JUMP
- [279] JUMPDEST
- [280] PUSH2 0x00c6
- [281] JUMP
- [282] JUMPDEST
- [283] SWAP1
- [284] PUSH1 0x1f
- [285] DUP1
- [286] NOT
- [287] SWAP2
- [288] ADD
- [289] AND
- [290] DUP2
- [291] ADD
- [292] SWAP1
- [293] DUP2
- [294] LT
- [295] PUSH8 0xffffffffffffffff
- [296] DUP3
- [297] GT
- [298] OR
- [299] PUSH2 0x0269
- [300] JUMPI
- [301] PUSH1 0x40
- [302] MSTORE
- [303] JUMP
- [304] JUMPDEST
- [305] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
- [306] PUSH1 0x00
- [307] MSTORE
- [308] PUSH1 0x41
- [309] PUSH1 0x04
- [310] MSTORE
- [311] PUSH1 0x24
- [312] PUSH1 0x00
- [313] REVERT
- [314] JUMPDEST
- [315] SWAP1
- [316] DUP2
- [317] PUSH1 0x20
- [318] SWAP2
- [319] SUB
- [320] SLT
- [321] PUSH2 0x01e7
- [322] JUMPI
- [323] MLOAD
- [324] DUP1
- [325] ISZERO
- [326] ISZERO
- [327] DUP2
- [328] SUB
- [329] PUSH2 0x01e7
- [330] JUMPI
- [331] SWAP1
- [332] JUMP
- [333] 'fe'(Unknown Opcode)
- [334] LOG2
- [335] PUSH5 0x6970667358
- [336] '22'(Unknown Opcode)
- [337] SLT
- [338] SHA3
- [339] 'dc'(Unknown Opcode)
- [340] AND
- [341] 'b7'(Unknown Opcode)
- [342] '1f'(Unknown Opcode)
- [343] ADDRESS
- [344] 'fc'(Unknown Opcode)
- [345] 'e6'(Unknown Opcode)
- [346] MSIZE
- [347] 'bd'(Unknown Opcode)
- [348] 'f6'(Unknown Opcode)
- [349] 'ae'(Unknown Opcode)
- [350] SWAP6
- [351] BLOBHASH
- [352] LT
- [353] 'ea'(Unknown Opcode)
- [354] 'c1'(Unknown Opcode)
- [355] SWAP4
- [356] MSTORE8
- [357] SWAP9
- [358] 'ca'(Unknown Opcode)
- [359] 'be'(Unknown Opcode)
- [360] CALLCODE
- [361] '0f'(Unknown Opcode)
- [362] '25'(Unknown Opcode)
- [363] XOR
- [364] '2c'(Unknown Opcode)
- [365] RETURNDATACOPY
- [366] 'b6'(Unknown Opcode)
- [367] 'be'(Unknown Opcode)
- [368] 'e2'(Unknown Opcode)
- [369] '0f'(Unknown Opcode)
- [370] 'd8'(Unknown Opcode)
- [371] PUSH5 0x736f6c6343
- [372] STOP
- [373] ADDMOD
- [374] SHR
- [375] STOP
- [376] CALLER