Sonic Blaze Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x0010
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0041
  • [17] JUMPI
  • [18] PUSH1 0x00
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x2e64cec1
  • [24] EQ
  • [25] PUSH2 0x0046
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0x6057361d
  • [29] EQ
  • [30] PUSH2 0x0064
  • [31] JUMPI
  • [32] DUP1
  • [33] PUSH4 0xd09de08a
  • [34] EQ
  • [35] PUSH2 0x0080
  • [36] JUMPI
  • [37] JUMPDEST
  • [38] PUSH1 0x00
  • [39] DUP1
  • [40] REVERT
  • [41] JUMPDEST
  • [42] PUSH2 0x004e
  • [43] PUSH2 0x008a
  • [44] JUMP
  • [45] JUMPDEST
  • [46] PUSH1 0x40
  • [47] MLOAD
  • [48] PUSH2 0x005b
  • [49] SWAP2
  • [50] SWAP1
  • [51] PUSH2 0x00d1
  • [52] JUMP
  • [53] JUMPDEST
  • [54] PUSH1 0x40
  • [55] MLOAD
  • [56] DUP1
  • [57] SWAP2
  • [58] SUB
  • [59] SWAP1
  • [60] RETURN
  • [61] JUMPDEST
  • [62] PUSH2 0x007e
  • [63] PUSH1 0x04
  • [64] DUP1
  • [65] CALLDATASIZE
  • [66] SUB
  • [67] DUP2
  • [68] ADD
  • [69] SWAP1
  • [70] PUSH2 0x0079
  • [71] SWAP2
  • [72] SWAP1
  • [73] PUSH2 0x011d
  • [74] JUMP
  • [75] JUMPDEST
  • [76] PUSH2 0x0093
  • [77] JUMP
  • [78] JUMPDEST
  • [79] STOP
  • [80] JUMPDEST
  • [81] PUSH2 0x0088
  • [82] PUSH2 0x009d
  • [83] JUMP
  • [84] JUMPDEST
  • [85] STOP
  • [86] JUMPDEST
  • [87] PUSH1 0x00
  • [88] DUP1
  • [89] SLOAD
  • [90] SWAP1
  • [91] POP
  • [92] SWAP1
  • [93] JUMP
  • [94] JUMPDEST
  • [95] DUP1
  • [96] PUSH1 0x00
  • [97] DUP2
  • [98] SWAP1
  • [99] SSTORE
  • [100] POP
  • [101] POP
  • [102] JUMP
  • [103] JUMPDEST
  • [104] PUSH1 0x01
  • [105] PUSH1 0x00
  • [106] DUP1
  • [107] DUP3
  • [108] DUP3
  • [109] SLOAD
  • [110] PUSH2 0x00af
  • [111] SWAP2
  • [112] SWAP1
  • [113] PUSH2 0x0179
  • [114] JUMP
  • [115] JUMPDEST
  • [116] SWAP3
  • [117] POP
  • [118] POP
  • [119] DUP2
  • [120] SWAP1
  • [121] SSTORE
  • [122] POP
  • [123] JUMP
  • [124] JUMPDEST
  • [125] PUSH1 0x00
  • [126] DUP2
  • [127] SWAP1
  • [128] POP
  • [129] SWAP2
  • [130] SWAP1
  • [131] POP
  • [132] JUMP
  • [133] JUMPDEST
  • [134] PUSH2 0x00cb
  • [135] DUP2
  • [136] PUSH2 0x00b8
  • [137] JUMP
  • [138] JUMPDEST
  • [139] DUP3
  • [140] MSTORE
  • [141] POP
  • [142] POP
  • [143] JUMP
  • [144] JUMPDEST
  • [145] PUSH1 0x00
  • [146] PUSH1 0x20
  • [147] DUP3
  • [148] ADD
  • [149] SWAP1
  • [150] POP
  • [151] PUSH2 0x00e6
  • [152] PUSH1 0x00
  • [153] DUP4
  • [154] ADD
  • [155] DUP5
  • [156] PUSH2 0x00c2
  • [157] JUMP
  • [158] JUMPDEST
  • [159] SWAP3
  • [160] SWAP2
  • [161] POP
  • [162] POP
  • [163] JUMP
  • [164] JUMPDEST
  • [165] PUSH1 0x00
  • [166] DUP1
  • [167] REVERT
  • [168] JUMPDEST
  • [169] PUSH2 0x00fa
  • [170] DUP2
  • [171] PUSH2 0x00b8
  • [172] JUMP
  • [173] JUMPDEST
  • [174] DUP2
  • [175] EQ
  • [176] PUSH2 0x0105
  • [177] JUMPI
  • [178] PUSH1 0x00
  • [179] DUP1
  • [180] REVERT
  • [181] JUMPDEST
  • [182] POP
  • [183] JUMP
  • [184] JUMPDEST
  • [185] PUSH1 0x00
  • [186] DUP2
  • [187] CALLDATALOAD
  • [188] SWAP1
  • [189] POP
  • [190] PUSH2 0x0117
  • [191] DUP2
  • [192] PUSH2 0x00f1
  • [193] JUMP
  • [194] JUMPDEST
  • [195] SWAP3
  • [196] SWAP2
  • [197] POP
  • [198] POP
  • [199] JUMP
  • [200] JUMPDEST
  • [201] PUSH1 0x00
  • [202] PUSH1 0x20
  • [203] DUP3
  • [204] DUP5
  • [205] SUB
  • [206] SLT
  • [207] ISZERO
  • [208] PUSH2 0x0133
  • [209] JUMPI
  • [210] PUSH2 0x0132
  • [211] PUSH2 0x00ec
  • [212] JUMP
  • [213] JUMPDEST
  • [214] JUMPDEST
  • [215] PUSH1 0x00
  • [216] PUSH2 0x0141
  • [217] DUP5
  • [218] DUP3
  • [219] DUP6
  • [220] ADD
  • [221] PUSH2 0x0108
  • [222] JUMP
  • [223] JUMPDEST
  • [224] SWAP2
  • [225] POP
  • [226] POP
  • [227] SWAP3
  • [228] SWAP2
  • [229] POP
  • [230] POP
  • [231] JUMP
  • [232] JUMPDEST
  • [233] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
  • [234] PUSH1 0x00
  • [235] MSTORE
  • [236] PUSH1 0x11
  • [237] PUSH1 0x04
  • [238] MSTORE
  • [239] PUSH1 0x24
  • [240] PUSH1 0x00
  • [241] REVERT
  • [242] JUMPDEST
  • [243] PUSH1 0x00
  • [244] PUSH2 0x0184
  • [245] DUP3
  • [246] PUSH2 0x00b8
  • [247] JUMP
  • [248] JUMPDEST
  • [249] SWAP2
  • [250] POP
  • [251] PUSH2 0x018f
  • [252] DUP4
  • [253] PUSH2 0x00b8
  • [254] JUMP
  • [255] JUMPDEST
  • [256] SWAP3
  • [257] POP
  • [258] DUP3
  • [259] DUP3
  • [260] ADD
  • [261] SWAP1
  • [262] POP
  • [263] DUP1
  • [264] DUP3
  • [265] GT
  • [266] ISZERO
  • [267] PUSH2 0x01a7
  • [268] JUMPI
  • [269] PUSH2 0x01a6
  • [270] PUSH2 0x014a
  • [271] JUMP
  • [272] JUMPDEST
  • [273] JUMPDEST
  • [274] SWAP3
  • [275] SWAP2
  • [276] POP
  • [277] POP
  • [278] JUMP
  • [279] 'fe'(Unknown Opcode)
  • [280] LOG2
  • [281] PUSH5 0x6970667358
  • [282] '22'(Unknown Opcode)
  • [283] SLT
  • [284] SHA3
  • [285] DUP10
  • [286] '23'(Unknown Opcode)
  • [287] PUSH32 0x069610b43d62eaa4868d147793d876dd5c043c28aee96977629806e60864736f