Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLDATASIZE
- [4] PUSH2 0x0013
- [5] JUMPI
- [6] PUSH2 0x0011
- [7] PUSH2 0x0017
- [8] JUMP
- [9] JUMPDEST
- [10] STOP
- [11] JUMPDEST
- [12] PUSH2 0x0011
- [13] JUMPDEST
- [14] PUSH2 0x0027
- [15] PUSH2 0x0022
- [16] PUSH2 0x0055
- [17] JUMP
- [18] JUMPDEST
- [19] PUSH2 0x00de
- [20] JUMP
- [21] JUMPDEST
- [22] JUMP
- [23] JUMPDEST
- [24] PUSH1 0x60
- [25] PUSH2 0x004e
- [26] DUP4
- [27] DUP4
- [28] PUSH1 0x40
- [29] MLOAD
- [30] DUP1
- [31] PUSH1 0x60
- [32] ADD
- [33] PUSH1 0x40
- [34] MSTORE
- [35] DUP1
- [36] PUSH1 0x27
- [37] DUP2
- [38] MSTORE
- [39] PUSH1 0x20
- [40] ADD
- [41] PUSH2 0x02c6
- [42] PUSH1 0x27
- [43] SWAP2
- [44] CODECOPY
- [45] PUSH2 0x0102
- [46] JUMP
- [47] JUMPDEST
- [48] SWAP4
- [49] SWAP3
- [50] POP
- [51] POP
- [52] POP
- [53] JUMP
- [54] JUMPDEST
- [55] PUSH1 0x00
- [56] PUSH32 0x000000000000000000000000db46d1dc155634fbc732f92e853b10b288ad5a1d
- [57] PUSH1 0x01
- [58] PUSH1 0x01
- [59] PUSH1 0xa0
- [60] SHL
- [61] SUB
- [62] AND
- [63] PUSH4 0x3502ac4b
- [64] PUSH1 0x40
- [65] MLOAD
- [66] DUP2
- [67] PUSH4 0xffffffff
- [68] AND
- [69] PUSH1 0xe0
- [70] SHL
- [71] DUP2
- [72] MSTORE
- [73] PUSH1 0x04
- [74] ADD
- [75] PUSH1 0x20
- [76] PUSH1 0x40
- [77] MLOAD
- [78] DUP1
- [79] DUP4
- [80] SUB
- [81] DUP2
- [82] DUP7
- [83] GAS
- [84] STATICCALL
- [85] ISZERO
- [86] DUP1
- [87] ISZERO
- [88] PUSH2 0x00b5
- [89] JUMPI
- [90] RETURNDATASIZE
- [91] PUSH1 0x00
- [92] DUP1
- [93] RETURNDATACOPY
- [94] RETURNDATASIZE
- [95] PUSH1 0x00
- [96] REVERT
- [97] JUMPDEST
- [98] POP
- [99] POP
- [100] POP
- [101] POP
- [102] PUSH1 0x40
- [103] MLOAD
- [104] RETURNDATASIZE
- [105] PUSH1 0x1f
- [106] NOT
- [107] PUSH1 0x1f
- [108] DUP3
- [109] ADD
- [110] AND
- [111] DUP3
- [112] ADD
- [113] DUP1
- [114] PUSH1 0x40
- [115] MSTORE
- [116] POP
- [117] DUP2
- [118] ADD
- [119] SWAP1
- [120] PUSH2 0x00d9
- [121] SWAP2
- [122] SWAP1
- [123] PUSH2 0x021d
- [124] JUMP
- [125] JUMPDEST
- [126] SWAP1
- [127] POP
- [128] SWAP1
- [129] JUMP
- [130] JUMPDEST
- [131] CALLDATASIZE
- [132] PUSH1 0x00
- [133] DUP1
- [134] CALLDATACOPY
- [135] PUSH1 0x00
- [136] DUP1
- [137] CALLDATASIZE
- [138] PUSH1 0x00
- [139] DUP5
- [140] GAS
- [141] DELEGATECALL
- [142] RETURNDATASIZE
- [143] PUSH1 0x00
- [144] DUP1
- [145] RETURNDATACOPY
- [146] DUP1
- [147] DUP1
- [148] ISZERO
- [149] PUSH2 0x00fd
- [150] JUMPI
- [151] RETURNDATASIZE
- [152] PUSH1 0x00
- [153] RETURN
- [154] JUMPDEST
- [155] RETURNDATASIZE
- [156] PUSH1 0x00
- [157] REVERT
- [158] JUMPDEST
- [159] PUSH1 0x60
- [160] PUSH1 0x01
- [161] PUSH1 0x01
- [162] PUSH1 0xa0
- [163] SHL
- [164] SUB
- [165] DUP5
- [166] AND
- [167] EXTCODESIZE
- [168] PUSH2 0x016f
- [169] JUMPI
- [170] PUSH1 0x40
- [171] MLOAD
- [172] PUSH3 0x461bcd
- [173] PUSH1 0xe5
- [174] SHL
- [175] DUP2
- [176] MSTORE
- [177] PUSH1 0x20
- [178] PUSH1 0x04
- [179] DUP3
- [180] ADD
- [181] MSTORE
- [182] PUSH1 0x26
- [183] PUSH1 0x24
- [184] DUP3
- [185] ADD
- [186] MSTORE
- [187] PUSH32 0x416464726573733a2064656c65676174652063616c6c20746f206e6f6e2d636f
- [188] PUSH1 0x44
- [189] DUP3
- [190] ADD
- [191] MSTORE
- [192] PUSH6 0x1b9d1c9858dd
- [193] PUSH1 0xd2
- [194] SHL
- [195] PUSH1 0x64
- [196] DUP3
- [197] ADD
- [198] MSTORE
- [199] PUSH1 0x84
- [200] ADD
- [201] JUMPDEST
- [202] PUSH1 0x40
- [203] MLOAD
- [204] DUP1
- [205] SWAP2
- [206] SUB
- [207] SWAP1
- [208] REVERT
- [209] JUMPDEST
- [210] PUSH1 0x00
- [211] DUP1
- [212] DUP6
- [213] PUSH1 0x01
- [214] PUSH1 0x01
- [215] PUSH1 0xa0
- [216] SHL
- [217] SUB
- [218] AND
- [219] DUP6
- [220] PUSH1 0x40
- [221] MLOAD
- [222] PUSH2 0x018a
- [223] SWAP2
- [224] SWAP1
- [225] PUSH2 0x0276
- [226] JUMP
- [227] JUMPDEST
- [228] PUSH1 0x00
- [229] PUSH1 0x40
- [230] MLOAD
- [231] DUP1
- [232] DUP4
- [233] SUB
- [234] DUP2
- [235] DUP6
- [236] GAS
- [237] DELEGATECALL
- [238] SWAP2
- [239] POP
- [240] POP
- [241] RETURNDATASIZE
- [242] DUP1
- [243] PUSH1 0x00
- [244] DUP2
- [245] EQ
- [246] PUSH2 0x01c5
- [247] JUMPI
- [248] PUSH1 0x40
- [249] MLOAD
- [250] SWAP2
- [251] POP
- [252] PUSH1 0x1f
- [253] NOT
- [254] PUSH1 0x3f
- [255] RETURNDATASIZE
- [256] ADD
- [257] AND
- [258] DUP3
- [259] ADD
- [260] PUSH1 0x40
- [261] MSTORE
- [262] RETURNDATASIZE
- [263] DUP3
- [264] MSTORE
- [265] RETURNDATASIZE
- [266] PUSH1 0x00
- [267] PUSH1 0x20
- [268] DUP5
- [269] ADD
- [270] RETURNDATACOPY
- [271] PUSH2 0x01ca
- [272] JUMP
- [273] JUMPDEST
- [274] PUSH1 0x60
- [275] SWAP2
- [276] POP
- [277] JUMPDEST
- [278] POP
- [279] SWAP2
- [280] POP
- [281] SWAP2
- [282] POP
- [283] PUSH2 0x01da
- [284] DUP3
- [285] DUP3
- [286] DUP7
- [287] PUSH2 0x01e4
- [288] JUMP
- [289] JUMPDEST
- [290] SWAP7
- [291] SWAP6
- [292] POP
- [293] POP
- [294] POP
- [295] POP
- [296] POP
- [297] POP
- [298] JUMP
- [299] JUMPDEST
- [300] PUSH1 0x60
- [301] DUP4
- [302] ISZERO
- [303] PUSH2 0x01f3
- [304] JUMPI
- [305] POP
- [306] DUP2
- [307] PUSH2 0x004e
- [308] JUMP
- [309] JUMPDEST
- [310] DUP3
- [311] MLOAD
- [312] ISZERO
- [313] PUSH2 0x0203
- [314] JUMPI
- [315] DUP3
- [316] MLOAD
- [317] DUP1
- [318] DUP5
- [319] PUSH1 0x20
- [320] ADD
- [321] REVERT
- [322] JUMPDEST
- [323] DUP2
- [324] PUSH1 0x40
- [325] MLOAD
- [326] PUSH3 0x461bcd
- [327] PUSH1 0xe5
- [328] SHL
- [329] DUP2
- [330] MSTORE
- [331] PUSH1 0x04
- [332] ADD
- [333] PUSH2 0x0166
- [334] SWAP2
- [335] SWAP1
- [336] PUSH2 0x0292
- [337] JUMP
- [338] JUMPDEST
- [339] PUSH1 0x00
- [340] PUSH1 0x20
- [341] DUP3
- [342] DUP5
- [343] SUB
- [344] SLT
- [345] ISZERO
- [346] PUSH2 0x022f
- [347] JUMPI
- [348] PUSH1 0x00
- [349] DUP1
- [350] REVERT
- [351] JUMPDEST
- [352] DUP2
- [353] MLOAD
- [354] PUSH1 0x01
- [355] PUSH1 0x01
- [356] PUSH1 0xa0
- [357] SHL
- [358] SUB
- [359] DUP2
- [360] AND
- [361] DUP2
- [362] EQ
- [363] PUSH2 0x004e
- [364] JUMPI
- [365] PUSH1 0x00
- [366] DUP1
- [367] REVERT
- [368] JUMPDEST
- [369] PUSH1 0x00
- [370] JUMPDEST
- [371] DUP4
- [372] DUP2
- [373] LT
- [374] ISZERO
- [375] PUSH2 0x0261
- [376] JUMPI
- [377] DUP2
- [378] DUP2
- [379] ADD
- [380] MLOAD
- [381] DUP4
- [382] DUP3
- [383] ADD
- [384] MSTORE
- [385] PUSH1 0x20
- [386] ADD
- [387] PUSH2 0x0249
- [388] JUMP
- [389] JUMPDEST
- [390] DUP4
- [391] DUP2
- [392] GT
- [393] ISZERO
- [394] PUSH2 0x0270
- [395] JUMPI
- [396] PUSH1 0x00
- [397] DUP5
- [398] DUP5
- [399] ADD
- [400] MSTORE
- [401] JUMPDEST
- [402] POP
- [403] POP
- [404] POP
- [405] POP
- [406] JUMP
- [407] JUMPDEST
- [408] PUSH1 0x00
- [409] DUP3
- [410] MLOAD
- [411] PUSH2 0x0288
- [412] DUP2
- [413] DUP5
- [414] PUSH1 0x20
- [415] DUP8
- [416] ADD
- [417] PUSH2 0x0246
- [418] JUMP
- [419] JUMPDEST
- [420] SWAP2
- [421] SWAP1
- [422] SWAP2
- [423] ADD
- [424] SWAP3
- [425] SWAP2
- [426] POP
- [427] POP
- [428] JUMP
- [429] JUMPDEST
- [430] PUSH1 0x20
- [431] DUP2
- [432] MSTORE
- [433] PUSH1 0x00
- [434] DUP3
- [435] MLOAD
- [436] DUP1
- [437] PUSH1 0x20
- [438] DUP5
- [439] ADD
- [440] MSTORE
- [441] PUSH2 0x02b1
- [442] DUP2
- [443] PUSH1 0x40
- [444] DUP6
- [445] ADD
- [446] PUSH1 0x20
- [447] DUP8
- [448] ADD
- [449] PUSH2 0x0246
- [450] JUMP
- [451] JUMPDEST
- [452] PUSH1 0x1f
- [453] ADD
- [454] PUSH1 0x1f
- [455] NOT
- [456] AND
- [457] SWAP2
- [458] SWAP1
- [459] SWAP2
- [460] ADD
- [461] PUSH1 0x40
- [462] ADD
- [463] SWAP3
- [464] SWAP2
- [465] POP
- [466] POP
- [467] JUMP
- [468] 'fe'(Unknown Opcode)
- [469] COINBASE
- [470] PUSH5 0x6472657373
- [471] GASPRICE
- [472] SHA3
- [473] PUSH13 0x6f772d6c6576656c2064656c65
- [474] PUSH8 0x6174652063616c6c
- [475] SHA3
- [476] PUSH7 0x61696c6564a264
- [477] PUSH10 0x7066735822122033b8b2
- [478] LT
- [479] CALLDATACOPY
- [480] PUSH16 0x0e3a717318c1e885ca090c9bd64d3142
- [481] '24'(Unknown Opcode)
- [482] 'd0'(Unknown Opcode)
- [483] 'a7'(Unknown Opcode)
- [484] 'f9'(Unknown Opcode)