Sonic Blaze Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH1 0x0f
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH1 0x28
  • [17] JUMPI
  • [18] PUSH1 0x00
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x1249c58b
  • [24] EQ
  • [25] PUSH1 0x2d
  • [26] JUMPI
  • [27] JUMPDEST
  • [28] PUSH1 0x00
  • [29] DUP1
  • [30] REVERT
  • [31] JUMPDEST
  • [32] STOP
  • [33] 'fe'(Unknown Opcode)
  • [34] LOG2
  • [35] PUSH5 0x6970667358
  • [36] '22'(Unknown Opcode)
  • [37] SLT
  • [38] SHA3
  • [39] 'b8'(Unknown Opcode)
  • [40] '21'(Unknown Opcode)
  • [41] 'ba'(Unknown Opcode)
  • [42] '2d'(Unknown Opcode)
  • [43] '0e'(Unknown Opcode)
  • [44] 'b8'(Unknown Opcode)
  • [45] DUP11
  • [46] PUSH7 0x334025854e11d3
  • [47] SHL
  • [48] SWAP4
  • [49] ADD
  • [50] 'cd'(Unknown Opcode)
  • [51] '29'(Unknown Opcode)