Sonic Blaze Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x04
  • [4] CALLDATASIZE
  • [5] LT
  • [6] PUSH2 0x0021
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] CALLDATALOAD
  • [10] PUSH1 0xe0
  • [11] SHR
  • [12] DUP1
  • [13] PUSH4 0x59659e90
  • [14] EQ
  • [15] PUSH2 0x00c9
  • [16] JUMPI
  • [17] PUSH2 0x0028
  • [18] JUMP
  • [19] JUMPDEST
  • [20] CALLDATASIZE
  • [21] PUSH2 0x0028
  • [22] JUMPI
  • [23] STOP
  • [24] JUMPDEST
  • [25] PUSH0 0x
  • [26] PUSH32 0x000000000000000000000000d5cece180a52e0353654b3337c985e8d5e056344
  • [27] PUSH1 0x01
  • [28] PUSH1 0x01
  • [29] PUSH1 0xa0
  • [30] SHL
  • [31] SUB
  • [32] AND
  • [33] PUSH4 0x5c60da1b
  • [34] PUSH1 0x40
  • [35] MLOAD
  • [36] DUP2
  • [37] PUSH4 0xffffffff
  • [38] AND
  • [39] PUSH1 0xe0
  • [40] SHL
  • [41] DUP2
  • [42] MSTORE
  • [43] PUSH1 0x04
  • [44] ADD
  • [45] PUSH1 0x20
  • [46] PUSH1 0x40
  • [47] MLOAD
  • [48] DUP1
  • [49] DUP4
  • [50] SUB
  • [51] DUP2
  • [52] DUP7
  • [53] GAS
  • [54] STATICCALL
  • [55] ISZERO
  • [56] DUP1
  • [57] ISZERO
  • [58] PUSH2 0x0085
  • [59] JUMPI
  • [60] RETURNDATASIZE
  • [61] PUSH0 0x
  • [62] PUSH0 0x
  • [63] RETURNDATACOPY
  • [64] RETURNDATASIZE
  • [65] PUSH0 0x
  • [66] REVERT
  • [67] JUMPDEST
  • [68] POP
  • [69] POP
  • [70] POP
  • [71] POP
  • [72] PUSH1 0x40
  • [73] MLOAD
  • [74] RETURNDATASIZE
  • [75] PUSH1 0x1f
  • [76] NOT
  • [77] PUSH1 0x1f
  • [78] DUP3
  • [79] ADD
  • [80] AND
  • [81] DUP3
  • [82] ADD
  • [83] DUP1
  • [84] PUSH1 0x40
  • [85] MSTORE
  • [86] POP
  • [87] DUP2
  • [88] ADD
  • [89] SWAP1
  • [90] PUSH2 0x00a9
  • [91] SWAP2
  • [92] SWAP1
  • [93] PUSH2 0x0118
  • [94] JUMP
  • [95] JUMPDEST
  • [96] SWAP1
  • [97] POP
  • [98] CALLDATASIZE
  • [99] PUSH0 0x
  • [100] PUSH0 0x
  • [101] CALLDATACOPY
  • [102] PUSH0 0x
  • [103] PUSH0 0x
  • [104] CALLDATASIZE
  • [105] PUSH0 0x
  • [106] DUP5
  • [107] GAS
  • [108] DELEGATECALL
  • [109] RETURNDATASIZE
  • [110] PUSH0 0x
  • [111] PUSH0 0x
  • [112] RETURNDATACOPY
  • [113] DUP1
  • [114] DUP1
  • [115] ISZERO
  • [116] PUSH2 0x00c5
  • [117] JUMPI
  • [118] RETURNDATASIZE
  • [119] PUSH0 0x
  • [120] RETURN
  • [121] JUMPDEST
  • [122] RETURNDATASIZE
  • [123] PUSH0 0x
  • [124] REVERT
  • [125] JUMPDEST
  • [126] CALLVALUE
  • [127] DUP1
  • [128] ISZERO
  • [129] PUSH2 0x00d4
  • [130] JUMPI
  • [131] PUSH0 0x
  • [132] PUSH0 0x
  • [133] REVERT
  • [134] JUMPDEST
  • [135] POP
  • [136] PUSH2 0x00fc
  • [137] PUSH32 0x000000000000000000000000d5cece180a52e0353654b3337c985e8d5e056344
  • [138] DUP2
  • [139] JUMP
  • [140] JUMPDEST
  • [141] PUSH1 0x40
  • [142] MLOAD
  • [143] PUSH1 0x01
  • [144] PUSH1 0x01
  • [145] PUSH1 0xa0
  • [146] SHL
  • [147] SUB
  • [148] SWAP1
  • [149] SWAP2
  • [150] AND
  • [151] DUP2
  • [152] MSTORE
  • [153] PUSH1 0x20
  • [154] ADD
  • [155] PUSH1 0x40
  • [156] MLOAD
  • [157] DUP1
  • [158] SWAP2
  • [159] SUB
  • [160] SWAP1
  • [161] RETURN
  • [162] JUMPDEST
  • [163] PUSH0 0x
  • [164] PUSH1 0x20
  • [165] DUP3
  • [166] DUP5
  • [167] SUB
  • [168] SLT
  • [169] ISZERO
  • [170] PUSH2 0x0128
  • [171] JUMPI
  • [172] PUSH0 0x
  • [173] PUSH0 0x
  • [174] REVERT
  • [175] JUMPDEST
  • [176] DUP2
  • [177] MLOAD
  • [178] PUSH1 0x01
  • [179] PUSH1 0x01
  • [180] PUSH1 0xa0
  • [181] SHL
  • [182] SUB
  • [183] DUP2
  • [184] AND
  • [185] DUP2
  • [186] EQ
  • [187] PUSH2 0x013e
  • [188] JUMPI
  • [189] PUSH0 0x
  • [190] PUSH0 0x
  • [191] REVERT
  • [192] JUMPDEST
  • [193] SWAP4
  • [194] SWAP3
  • [195] POP
  • [196] POP
  • [197] POP
  • [198] JUMP
  • [199] 'fe'(Unknown Opcode)
  • [200] LOG2
  • [201] PUSH5 0x6970667358
  • [202] '22'(Unknown Opcode)
  • [203] SLT
  • [204] SHA3
  • [205] SUB
  • [206] PUSH2 0xff97
  • [207] CALLCODE
  • [208] SWAP15
  • [209] 'd4'(Unknown Opcode)
  • [210] 'ac'(Unknown Opcode)
  • [211] DUP16
  • [212] MCOPY
  • [213] EXTCODESIZE
  • [214] SHA3
  • [215] EQ
  • [216] SWAP5
  • [217] PUSH9 0x32a78c047a557770c2
  • [218] JUMP
  • [219] 'e2'(Unknown Opcode)