Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [4] CALLER
- [5] PUSH32 0x0000000000000000000000002a76cb99cff1eed9fffc86405e513b6bd47e605e
- [6] DUP3
- [7] AND
- [8] SUB
- [9] PUSH2 0x00c0
- [10] JUMPI
- [11] PUSH0 0x
- [12] CALLDATALOAD
- [13] PUSH32 0xffffffff00000000000000000000000000000000000000000000000000000000
- [14] AND
- [15] PUSH32 0x4f1ef28600000000000000000000000000000000000000000000000000000000
- [16] EQ
- [17] PUSH2 0x00b6
- [18] JUMPI
- [19] PUSH1 0x04
- [20] PUSH1 0x40
- [21] MLOAD
- [22] PUSH32 0xd2b576ec00000000000000000000000000000000000000000000000000000000
- [23] DUP2
- [24] MSTORE
- [25] REVERT
- [26] JUMPDEST
- [27] PUSH2 0x00be
- [28] PUSH2 0x01b0
- [29] JUMP
- [30] JUMPDEST
- [31] STOP
- [32] JUMPDEST
- [33] PUSH0 0x
- [34] DUP1
- [35] SWAP2
- [36] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
- [37] SLOAD
- [38] AND
- [39] CALLDATASIZE
- [40] DUP3
- [41] DUP1
- [42] CALLDATACOPY
- [43] DUP2
- [44] CALLDATASIZE
- [45] SWAP2
- [46] GAS
- [47] DELEGATECALL
- [48] RETURNDATASIZE
- [49] PUSH0 0x
- [50] DUP1
- [51] RETURNDATACOPY
- [52] ISZERO
- [53] PUSH2 0x00fc
- [54] JUMPI
- [55] RETURNDATASIZE
- [56] PUSH0 0x
- [57] RETURN
- [58] JUMPDEST
- [59] RETURNDATASIZE
- [60] PUSH0 0x
- [61] REVERT
- [62] JUMPDEST
- [63] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
- [64] PUSH0 0x
- [65] MSTORE
- [66] PUSH1 0x41
- [67] PUSH1 0x04
- [68] MSTORE
- [69] PUSH1 0x24
- [70] PUSH0 0x
- [71] REVERT
- [72] JUMPDEST
- [73] SWAP1
- [74] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe0
- [75] PUSH1 0x1f
- [76] PUSH1 0x40
- [77] MLOAD
- [78] SWAP4
- [79] ADD
- [80] AND
- [81] DUP3
- [82] ADD
- [83] DUP3
- [84] DUP2
- [85] LT
- [86] PUSH8 0xffffffffffffffff
- [87] DUP3
- [88] GT
- [89] OR
- [90] PUSH2 0x0171
- [91] JUMPI
- [92] PUSH1 0x40
- [93] MSTORE
- [94] JUMP
- [95] JUMPDEST
- [96] PUSH2 0x0100
- [97] JUMP
- [98] JUMPDEST
- [99] PUSH8 0xffffffffffffffff
- [100] DUP2
- [101] GT
- [102] PUSH2 0x0171
- [103] JUMPI
- [104] PUSH1 0x1f
- [105] ADD
- [106] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe0
- [107] AND
- [108] PUSH1 0x20
- [109] ADD
- [110] SWAP1
- [111] JUMP
- [112] JUMPDEST
- [113] CALLDATASIZE
- [114] PUSH1 0x04
- [115] GT
- [116] PUSH2 0x0263
- [117] JUMPI
- [118] PUSH1 0x40
- [119] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
- [120] CALLDATASIZE
- [121] ADD
- [122] SLT
- [123] PUSH2 0x0263
- [124] JUMPI
- [125] PUSH1 0x04
- [126] CALLDATALOAD
- [127] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [128] DUP2
- [129] AND
- [130] DUP1
- [131] SWAP2
- [132] SUB
- [133] PUSH2 0x0263
- [134] JUMPI
- [135] PUSH1 0x24
- [136] CALLDATALOAD
- [137] SWAP1
- [138] PUSH8 0xffffffffffffffff
- [139] DUP3
- [140] GT
- [141] PUSH2 0x0263
- [142] JUMPI
- [143] CALLDATASIZE
- [144] PUSH1 0x23
- [145] DUP4
- [146] ADD
- [147] SLT
- [148] ISZERO
- [149] PUSH2 0x0263
- [150] JUMPI
- [151] DUP2
- [152] PUSH1 0x04
- [153] ADD
- [154] CALLDATALOAD
- [155] SWAP1
- [156] PUSH2 0x0238
- [157] PUSH2 0x0233
- [158] DUP4
- [159] PUSH2 0x0176
- [160] JUMP
- [161] JUMPDEST
- [162] PUSH2 0x012d
- [163] JUMP
- [164] JUMPDEST
- [165] SWAP2
- [166] DUP1
- [167] DUP4
- [168] MSTORE
- [169] CALLDATASIZE
- [170] PUSH1 0x24
- [171] DUP3
- [172] DUP7
- [173] ADD
- [174] ADD
- [175] GT
- [176] PUSH2 0x0263
- [177] JUMPI
- [178] PUSH1 0x20
- [179] DUP2
- [180] PUSH0 0x
- [181] SWAP3
- [182] PUSH1 0x24
- [183] PUSH2 0x0261
- [184] SWAP8
- [185] ADD
- [186] DUP4
- [187] DUP8
- [188] ADD
- [189] CALLDATACOPY
- [190] DUP5
- [191] ADD
- [192] ADD
- [193] MSTORE
- [194] PUSH2 0x0267
- [195] JUMP
- [196] JUMPDEST
- [197] JUMP
- [198] JUMPDEST
- [199] PUSH0 0x
- [200] DUP1
- [201] REVERT
- [202] JUMPDEST
- [203] SWAP1
- [204] DUP2
- [205] EXTCODESIZE
- [206] ISZERO
- [207] PUSH2 0x0339
- [208] JUMPI
- [209] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [210] DUP3
- [211] AND
- [212] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
- [213] DUP2
- [214] PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
- [215] DUP3
- [216] SLOAD
- [217] AND
- [218] OR
- [219] SWAP1
- [220] SSTORE
- [221] PUSH32 0xbc7cd75a20ee27fd9adebab32041f755214dbc6bffa90cc0225b39da2e5c2d3b
- [222] PUSH0 0x
- [223] DUP1
- [224] LOG2
- [225] DUP1
- [226] MLOAD
- [227] ISZERO
- [228] PUSH2 0x0306
- [229] JUMPI
- [230] PUSH2 0x0303
- [231] SWAP2
- [232] PUSH2 0x0380
- [233] JUMP
- [234] JUMPDEST
- [235] POP
- [236] JUMP
- [237] JUMPDEST
- [238] POP
- [239] POP
- [240] CALLVALUE
- [241] PUSH2 0x030f
- [242] JUMPI
- [243] JUMP
- [244] JUMPDEST
- [245] PUSH1 0x04
- [246] PUSH1 0x40
- [247] MLOAD
- [248] PUSH32 0xb398979f00000000000000000000000000000000000000000000000000000000
- [249] DUP2
- [250] MSTORE
- [251] REVERT
- [252] JUMPDEST
- [253] PUSH1 0x24
- [254] DUP3
- [255] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [256] PUSH1 0x40
- [257] MLOAD
- [258] SWAP2
- [259] PUSH32 0x4c9c8ce300000000000000000000000000000000000000000000000000000000
- [260] DUP4
- [261] MSTORE
- [262] AND
- [263] PUSH1 0x04
- [264] DUP3
- [265] ADD
- [266] MSTORE
- [267] REVERT
- [268] JUMPDEST
- [269] PUSH0 0x
- [270] DUP1
- [271] PUSH2 0x03b2
- [272] SWAP4
- [273] PUSH1 0x20
- [274] DUP2
- [275] MLOAD
- [276] SWAP2
- [277] ADD
- [278] DUP5
- [279] GAS
- [280] DELEGATECALL
- [281] RETURNDATASIZE
- [282] ISZERO
- [283] PUSH2 0x03b5
- [284] JUMPI
- [285] RETURNDATASIZE
- [286] SWAP2
- [287] PUSH2 0x03a3
- [288] PUSH2 0x0233
- [289] DUP5
- [290] PUSH2 0x0176
- [291] JUMP
- [292] JUMPDEST
- [293] SWAP3
- [294] DUP4
- [295] MSTORE
- [296] RETURNDATASIZE
- [297] PUSH0 0x
- [298] PUSH1 0x20
- [299] DUP6
- [300] ADD
- [301] RETURNDATACOPY
- [302] PUSH2 0x03b9
- [303] JUMP
- [304] JUMPDEST
- [305] SWAP1
- [306] JUMP
- [307] JUMPDEST
- [308] PUSH1 0x60
- [309] SWAP2
- [310] JUMPDEST
- [311] SWAP1
- [312] PUSH2 0x03f8
- [313] JUMPI
- [314] POP
- [315] DUP1
- [316] MLOAD
- [317] ISZERO
- [318] PUSH2 0x03ce
- [319] JUMPI
- [320] DUP1
- [321] MLOAD
- [322] SWAP1
- [323] PUSH1 0x20
- [324] ADD
- [325] REVERT
- [326] JUMPDEST
- [327] PUSH1 0x04
- [328] PUSH1 0x40
- [329] MLOAD
- [330] PUSH32 0x1425ea4200000000000000000000000000000000000000000000000000000000
- [331] DUP2
- [332] MSTORE
- [333] REVERT
- [334] JUMPDEST
- [335] DUP2
- [336] MLOAD
- [337] ISZERO
- [338] DUP1
- [339] PUSH2 0x0450
- [340] JUMPI
- [341] JUMPDEST
- [342] PUSH2 0x0409
- [343] JUMPI
- [344] POP
- [345] SWAP1
- [346] JUMP
- [347] JUMPDEST
- [348] PUSH1 0x24
- [349] SWAP1
- [350] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [351] PUSH1 0x40
- [352] MLOAD
- [353] SWAP2
- [354] PUSH32 0x9996b31500000000000000000000000000000000000000000000000000000000
- [355] DUP4
- [356] MSTORE
- [357] AND
- [358] PUSH1 0x04
- [359] DUP3
- [360] ADD
- [361] MSTORE
- [362] REVERT
- [363] JUMPDEST
- [364] POP
- [365] DUP1
- [366] EXTCODESIZE
- [367] ISZERO
- [368] PUSH2 0x0401
- [369] JUMP
- [370] 'fe'(Unknown Opcode)
- [371] LOG1
- [372] PUSH5 0x736f6c6343
- [373] STOP
- [374] ADDMOD
- [375] XOR
- [376] STOP
- [377] EXP