Sonic Blaze Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [4] CALLER
  • [5] PUSH32 0x00000000000000000000000010932229d06ef0597b913a11506cd47b12e3257e
  • [6] DUP3
  • [7] AND
  • [8] SUB
  • [9] PUSH2 0x00c0
  • [10] JUMPI
  • [11] PUSH0 0x
  • [12] CALLDATALOAD
  • [13] PUSH32 0xffffffff00000000000000000000000000000000000000000000000000000000
  • [14] AND
  • [15] PUSH32 0x4f1ef28600000000000000000000000000000000000000000000000000000000
  • [16] EQ
  • [17] PUSH2 0x00b6
  • [18] JUMPI
  • [19] PUSH1 0x04
  • [20] PUSH1 0x40
  • [21] MLOAD
  • [22] PUSH32 0xd2b576ec00000000000000000000000000000000000000000000000000000000
  • [23] DUP2
  • [24] MSTORE
  • [25] REVERT
  • [26] JUMPDEST
  • [27] PUSH2 0x00be
  • [28] PUSH2 0x01b0
  • [29] JUMP
  • [30] JUMPDEST
  • [31] STOP
  • [32] JUMPDEST
  • [33] PUSH0 0x
  • [34] DUP1
  • [35] SWAP2
  • [36] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
  • [37] SLOAD
  • [38] AND
  • [39] CALLDATASIZE
  • [40] DUP3
  • [41] DUP1
  • [42] CALLDATACOPY
  • [43] DUP2
  • [44] CALLDATASIZE
  • [45] SWAP2
  • [46] GAS
  • [47] DELEGATECALL
  • [48] RETURNDATASIZE
  • [49] PUSH0 0x
  • [50] DUP1
  • [51] RETURNDATACOPY
  • [52] ISZERO
  • [53] PUSH2 0x00fc
  • [54] JUMPI
  • [55] RETURNDATASIZE
  • [56] PUSH0 0x
  • [57] RETURN
  • [58] JUMPDEST
  • [59] RETURNDATASIZE
  • [60] PUSH0 0x
  • [61] REVERT
  • [62] JUMPDEST
  • [63] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
  • [64] PUSH0 0x
  • [65] MSTORE
  • [66] PUSH1 0x41
  • [67] PUSH1 0x04
  • [68] MSTORE
  • [69] PUSH1 0x24
  • [70] PUSH0 0x
  • [71] REVERT
  • [72] JUMPDEST
  • [73] SWAP1
  • [74] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe0
  • [75] PUSH1 0x1f
  • [76] PUSH1 0x40
  • [77] MLOAD
  • [78] SWAP4
  • [79] ADD
  • [80] AND
  • [81] DUP3
  • [82] ADD
  • [83] DUP3
  • [84] DUP2
  • [85] LT
  • [86] PUSH8 0xffffffffffffffff
  • [87] DUP3
  • [88] GT
  • [89] OR
  • [90] PUSH2 0x0171
  • [91] JUMPI
  • [92] PUSH1 0x40
  • [93] MSTORE
  • [94] JUMP
  • [95] JUMPDEST
  • [96] PUSH2 0x0100
  • [97] JUMP
  • [98] JUMPDEST
  • [99] PUSH8 0xffffffffffffffff
  • [100] DUP2
  • [101] GT
  • [102] PUSH2 0x0171
  • [103] JUMPI
  • [104] PUSH1 0x1f
  • [105] ADD
  • [106] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe0
  • [107] AND
  • [108] PUSH1 0x20
  • [109] ADD
  • [110] SWAP1
  • [111] JUMP
  • [112] JUMPDEST
  • [113] CALLDATASIZE
  • [114] PUSH1 0x04
  • [115] GT
  • [116] PUSH2 0x0263
  • [117] JUMPI
  • [118] PUSH1 0x40
  • [119] PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
  • [120] CALLDATASIZE
  • [121] ADD
  • [122] SLT
  • [123] PUSH2 0x0263
  • [124] JUMPI
  • [125] PUSH1 0x04
  • [126] CALLDATALOAD
  • [127] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [128] DUP2
  • [129] AND
  • [130] DUP1
  • [131] SWAP2
  • [132] SUB
  • [133] PUSH2 0x0263
  • [134] JUMPI
  • [135] PUSH1 0x24
  • [136] CALLDATALOAD
  • [137] SWAP1
  • [138] PUSH8 0xffffffffffffffff
  • [139] DUP3
  • [140] GT
  • [141] PUSH2 0x0263
  • [142] JUMPI
  • [143] CALLDATASIZE
  • [144] PUSH1 0x23
  • [145] DUP4
  • [146] ADD
  • [147] SLT
  • [148] ISZERO
  • [149] PUSH2 0x0263
  • [150] JUMPI
  • [151] DUP2
  • [152] PUSH1 0x04
  • [153] ADD
  • [154] CALLDATALOAD
  • [155] SWAP1
  • [156] PUSH2 0x0238
  • [157] PUSH2 0x0233
  • [158] DUP4
  • [159] PUSH2 0x0176
  • [160] JUMP
  • [161] JUMPDEST
  • [162] PUSH2 0x012d
  • [163] JUMP
  • [164] JUMPDEST
  • [165] SWAP2
  • [166] DUP1
  • [167] DUP4
  • [168] MSTORE
  • [169] CALLDATASIZE
  • [170] PUSH1 0x24
  • [171] DUP3
  • [172] DUP7
  • [173] ADD
  • [174] ADD
  • [175] GT
  • [176] PUSH2 0x0263
  • [177] JUMPI
  • [178] PUSH1 0x20
  • [179] DUP2
  • [180] PUSH0 0x
  • [181] SWAP3
  • [182] PUSH1 0x24
  • [183] PUSH2 0x0261
  • [184] SWAP8
  • [185] ADD
  • [186] DUP4
  • [187] DUP8
  • [188] ADD
  • [189] CALLDATACOPY
  • [190] DUP5
  • [191] ADD
  • [192] ADD
  • [193] MSTORE
  • [194] PUSH2 0x0267
  • [195] JUMP
  • [196] JUMPDEST
  • [197] JUMP
  • [198] JUMPDEST
  • [199] PUSH0 0x
  • [200] DUP1
  • [201] REVERT
  • [202] JUMPDEST
  • [203] SWAP1
  • [204] DUP2
  • [205] EXTCODESIZE
  • [206] ISZERO
  • [207] PUSH2 0x0339
  • [208] JUMPI
  • [209] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [210] DUP3
  • [211] AND
  • [212] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
  • [213] DUP2
  • [214] PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
  • [215] DUP3
  • [216] SLOAD
  • [217] AND
  • [218] OR
  • [219] SWAP1
  • [220] SSTORE
  • [221] PUSH32 0xbc7cd75a20ee27fd9adebab32041f755214dbc6bffa90cc0225b39da2e5c2d3b
  • [222] PUSH0 0x
  • [223] DUP1
  • [224] LOG2
  • [225] DUP1
  • [226] MLOAD
  • [227] ISZERO
  • [228] PUSH2 0x0306
  • [229] JUMPI
  • [230] PUSH2 0x0303
  • [231] SWAP2
  • [232] PUSH2 0x0380
  • [233] JUMP
  • [234] JUMPDEST
  • [235] POP
  • [236] JUMP
  • [237] JUMPDEST
  • [238] POP
  • [239] POP
  • [240] CALLVALUE
  • [241] PUSH2 0x030f
  • [242] JUMPI
  • [243] JUMP
  • [244] JUMPDEST
  • [245] PUSH1 0x04
  • [246] PUSH1 0x40
  • [247] MLOAD
  • [248] PUSH32 0xb398979f00000000000000000000000000000000000000000000000000000000
  • [249] DUP2
  • [250] MSTORE
  • [251] REVERT
  • [252] JUMPDEST
  • [253] PUSH1 0x24
  • [254] DUP3
  • [255] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [256] PUSH1 0x40
  • [257] MLOAD
  • [258] SWAP2
  • [259] PUSH32 0x4c9c8ce300000000000000000000000000000000000000000000000000000000
  • [260] DUP4
  • [261] MSTORE
  • [262] AND
  • [263] PUSH1 0x04
  • [264] DUP3
  • [265] ADD
  • [266] MSTORE
  • [267] REVERT
  • [268] JUMPDEST
  • [269] PUSH0 0x
  • [270] DUP1
  • [271] PUSH2 0x03b2
  • [272] SWAP4
  • [273] PUSH1 0x20
  • [274] DUP2
  • [275] MLOAD
  • [276] SWAP2
  • [277] ADD
  • [278] DUP5
  • [279] GAS
  • [280] DELEGATECALL
  • [281] RETURNDATASIZE
  • [282] ISZERO
  • [283] PUSH2 0x03b5
  • [284] JUMPI
  • [285] RETURNDATASIZE
  • [286] SWAP2
  • [287] PUSH2 0x03a3
  • [288] PUSH2 0x0233
  • [289] DUP5
  • [290] PUSH2 0x0176
  • [291] JUMP
  • [292] JUMPDEST
  • [293] SWAP3
  • [294] DUP4
  • [295] MSTORE
  • [296] RETURNDATASIZE
  • [297] PUSH0 0x
  • [298] PUSH1 0x20
  • [299] DUP6
  • [300] ADD
  • [301] RETURNDATACOPY
  • [302] PUSH2 0x03b9
  • [303] JUMP
  • [304] JUMPDEST
  • [305] SWAP1
  • [306] JUMP
  • [307] JUMPDEST
  • [308] PUSH1 0x60
  • [309] SWAP2
  • [310] JUMPDEST
  • [311] SWAP1
  • [312] PUSH2 0x03f8
  • [313] JUMPI
  • [314] POP
  • [315] DUP1
  • [316] MLOAD
  • [317] ISZERO
  • [318] PUSH2 0x03ce
  • [319] JUMPI
  • [320] DUP1
  • [321] MLOAD
  • [322] SWAP1
  • [323] PUSH1 0x20
  • [324] ADD
  • [325] REVERT
  • [326] JUMPDEST
  • [327] PUSH1 0x04
  • [328] PUSH1 0x40
  • [329] MLOAD
  • [330] PUSH32 0x1425ea4200000000000000000000000000000000000000000000000000000000
  • [331] DUP2
  • [332] MSTORE
  • [333] REVERT
  • [334] JUMPDEST
  • [335] DUP2
  • [336] MLOAD
  • [337] ISZERO
  • [338] DUP1
  • [339] PUSH2 0x0450
  • [340] JUMPI
  • [341] JUMPDEST
  • [342] PUSH2 0x0409
  • [343] JUMPI
  • [344] POP
  • [345] SWAP1
  • [346] JUMP
  • [347] JUMPDEST
  • [348] PUSH1 0x24
  • [349] SWAP1
  • [350] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [351] PUSH1 0x40
  • [352] MLOAD
  • [353] SWAP2
  • [354] PUSH32 0x9996b31500000000000000000000000000000000000000000000000000000000
  • [355] DUP4
  • [356] MSTORE
  • [357] AND
  • [358] PUSH1 0x04
  • [359] DUP3
  • [360] ADD
  • [361] MSTORE
  • [362] REVERT
  • [363] JUMPDEST
  • [364] POP
  • [365] DUP1
  • [366] EXTCODESIZE
  • [367] ISZERO
  • [368] PUSH2 0x0401
  • [369] JUMP
  • [370] 'fe'(Unknown Opcode)
  • [371] LOG1
  • [372] PUSH5 0x736f6c6343
  • [373] STOP
  • [374] ADDMOD
  • [375] XOR
  • [376] STOP
  • [377] EXP