Sonic Blaze Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH1 0x0f
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH1 0x28
  • [17] JUMPI
  • [18] PUSH1 0x00
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x161e7150
  • [24] EQ
  • [25] PUSH1 0x2d
  • [26] JUMPI
  • [27] JUMPDEST
  • [28] PUSH1 0x00
  • [29] DUP1
  • [30] REVERT
  • [31] JUMPDEST
  • [32] PUSH1 0x8c
  • [33] PUSH1 0x04
  • [34] DUP1
  • [35] CALLDATASIZE
  • [36] SUB
  • [37] PUSH1 0x40
  • [38] DUP2
  • [39] LT
  • [40] ISZERO
  • [41] PUSH1 0x41
  • [42] JUMPI
  • [43] PUSH1 0x00
  • [44] DUP1
  • [45] REVERT
  • [46] JUMPDEST
  • [47] DUP2
  • [48] ADD
  • [49] SWAP1
  • [50] DUP1
  • [51] DUP1
  • [52] CALLDATALOAD
  • [53] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [54] AND
  • [55] SWAP1
  • [56] PUSH1 0x20
  • [57] ADD
  • [58] SWAP1
  • [59] SWAP3
  • [60] SWAP2
  • [61] SWAP1
  • [62] DUP1
  • [63] CALLDATALOAD
  • [64] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [65] AND
  • [66] SWAP1
  • [67] PUSH1 0x20
  • [68] ADD
  • [69] SWAP1
  • [70] SWAP3
  • [71] SWAP2
  • [72] SWAP1
  • [73] POP
  • [74] POP
  • [75] POP
  • [76] PUSH1 0xa6
  • [77] JUMP
  • [78] JUMPDEST
  • [79] PUSH1 0x40
  • [80] MLOAD
  • [81] DUP1
  • [82] DUP3
  • [83] ISZERO
  • [84] ISZERO
  • [85] ISZERO
  • [86] ISZERO
  • [87] DUP2
  • [88] MSTORE
  • [89] PUSH1 0x20
  • [90] ADD
  • [91] SWAP2
  • [92] POP
  • [93] POP
  • [94] PUSH1 0x40
  • [95] MLOAD
  • [96] DUP1
  • [97] SWAP2
  • [98] SUB
  • [99] SWAP1
  • [100] RETURN
  • [101] JUMPDEST
  • [102] PUSH1 0x00
  • [103] DUP2
  • [104] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [105] AND
  • [106] DUP4
  • [107] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [108] AND
  • [109] EQ
  • [110] ISZERO
  • [111] PUSH1 0xe3
  • [112] JUMPI
  • [113] PUSH1 0x01
  • [114] SWAP1
  • [115] POP
  • [116] PUSH1 0xe8
  • [117] JUMP
  • [118] JUMPDEST
  • [119] PUSH1 0x00
  • [120] SWAP1
  • [121] POP
  • [122] JUMPDEST
  • [123] SWAP3
  • [124] SWAP2
  • [125] POP
  • [126] POP
  • [127] JUMP
  • [128] 'fe'(Unknown Opcode)
  • [129] LOG2
  • [130] PUSH6 0x627a7a723158
  • [131] SHA3
  • [132] PUSH13 0xa43ffce5996dcb8796e1f9d729
  • [133] 'de'(Unknown Opcode)
  • [134] 'bf'(Unknown Opcode)
  • [135] '22'(Unknown Opcode)
  • [136] 'ed'(Unknown Opcode)
  • [137] 'ed'(Unknown Opcode)
  • [138] XOR
  • [139] SLT
  • [140] BLOCKHASH
  • [141] LOG1
  • [142] 'a8'(Unknown Opcode)
  • [143] LOG3
  • [144] EQ
  • [145] 'e4'(Unknown Opcode)
  • [146] 'f7'(Unknown Opcode)
  • [147] SWAP2
  • [148] 'd0'(Unknown Opcode)
  • [149] '1f'(Unknown Opcode)
  • [150] '21'(Unknown Opcode)
  • [151] PUSH5 0x736f6c6343
  • [152] STOP
  • [153] SDIV
  • [154] GT
  • [155] STOP
  • [156] ORIGIN