Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLDATASIZE
- [4] PUSH2 0x0013
- [5] JUMPI
- [6] PUSH2 0x0011
- [7] PUSH2 0x0017
- [8] JUMP
- [9] JUMPDEST
- [10] STOP
- [11] JUMPDEST
- [12] PUSH2 0x0011
- [13] JUMPDEST
- [14] PUSH2 0x0027
- [15] PUSH2 0x0022
- [16] PUSH2 0x0074
- [17] JUMP
- [18] JUMPDEST
- [19] PUSH2 0x00b9
- [20] JUMP
- [21] JUMPDEST
- [22] JUMP
- [23] JUMPDEST
- [24] PUSH1 0x60
- [25] PUSH2 0x004e
- [26] DUP4
- [27] DUP4
- [28] PUSH1 0x40
- [29] MLOAD
- [30] DUP1
- [31] PUSH1 0x60
- [32] ADD
- [33] PUSH1 0x40
- [34] MSTORE
- [35] DUP1
- [36] PUSH1 0x27
- [37] DUP2
- [38] MSTORE
- [39] PUSH1 0x20
- [40] ADD
- [41] PUSH2 0x02e5
- [42] PUSH1 0x27
- [43] SWAP2
- [44] CODECOPY
- [45] PUSH2 0x00dd
- [46] JUMP
- [47] JUMPDEST
- [48] SWAP4
- [49] SWAP3
- [50] POP
- [51] POP
- [52] POP
- [53] JUMP
- [54] JUMPDEST
- [55] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [56] AND
- [57] EXTCODESIZE
- [58] ISZERO
- [59] ISZERO
- [60] SWAP1
- [61] JUMP
- [62] JUMPDEST
- [63] SWAP1
- [64] JUMP
- [65] JUMPDEST
- [66] PUSH1 0x00
- [67] PUSH2 0x00b4
- [68] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
- [69] SLOAD
- [70] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [71] AND
- [72] SWAP1
- [73] JUMP
- [74] JUMPDEST
- [75] SWAP1
- [76] POP
- [77] SWAP1
- [78] JUMP
- [79] JUMPDEST
- [80] CALLDATASIZE
- [81] PUSH1 0x00
- [82] DUP1
- [83] CALLDATACOPY
- [84] PUSH1 0x00
- [85] DUP1
- [86] CALLDATASIZE
- [87] PUSH1 0x00
- [88] DUP5
- [89] GAS
- [90] DELEGATECALL
- [91] RETURNDATASIZE
- [92] PUSH1 0x00
- [93] DUP1
- [94] RETURNDATACOPY
- [95] DUP1
- [96] DUP1
- [97] ISZERO
- [98] PUSH2 0x00d8
- [99] JUMPI
- [100] RETURNDATASIZE
- [101] PUSH1 0x00
- [102] RETURN
- [103] JUMPDEST
- [104] RETURNDATASIZE
- [105] PUSH1 0x00
- [106] REVERT
- [107] JUMPDEST
- [108] PUSH1 0x60
- [109] PUSH1 0x00
- [110] DUP1
- [111] DUP6
- [112] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [113] AND
- [114] DUP6
- [115] PUSH1 0x40
- [116] MLOAD
- [117] PUSH2 0x0107
- [118] SWAP2
- [119] SWAP1
- [120] PUSH2 0x0277
- [121] JUMP
- [122] JUMPDEST
- [123] PUSH1 0x00
- [124] PUSH1 0x40
- [125] MLOAD
- [126] DUP1
- [127] DUP4
- [128] SUB
- [129] DUP2
- [130] DUP6
- [131] GAS
- [132] DELEGATECALL
- [133] SWAP2
- [134] POP
- [135] POP
- [136] RETURNDATASIZE
- [137] DUP1
- [138] PUSH1 0x00
- [139] DUP2
- [140] EQ
- [141] PUSH2 0x0142
- [142] JUMPI
- [143] PUSH1 0x40
- [144] MLOAD
- [145] SWAP2
- [146] POP
- [147] PUSH1 0x1f
- [148] NOT
- [149] PUSH1 0x3f
- [150] RETURNDATASIZE
- [151] ADD
- [152] AND
- [153] DUP3
- [154] ADD
- [155] PUSH1 0x40
- [156] MSTORE
- [157] RETURNDATASIZE
- [158] DUP3
- [159] MSTORE
- [160] RETURNDATASIZE
- [161] PUSH1 0x00
- [162] PUSH1 0x20
- [163] DUP5
- [164] ADD
- [165] RETURNDATACOPY
- [166] PUSH2 0x0147
- [167] JUMP
- [168] JUMPDEST
- [169] PUSH1 0x60
- [170] SWAP2
- [171] POP
- [172] JUMPDEST
- [173] POP
- [174] SWAP2
- [175] POP
- [176] SWAP2
- [177] POP
- [178] PUSH2 0x0158
- [179] DUP7
- [180] DUP4
- [181] DUP4
- [182] DUP8
- [183] PUSH2 0x0162
- [184] JUMP
- [185] JUMPDEST
- [186] SWAP7
- [187] SWAP6
- [188] POP
- [189] POP
- [190] POP
- [191] POP
- [192] POP
- [193] POP
- [194] JUMP
- [195] JUMPDEST
- [196] PUSH1 0x60
- [197] DUP4
- [198] ISZERO
- [199] PUSH2 0x01fd
- [200] JUMPI
- [201] DUP3
- [202] MLOAD
- [203] PUSH1 0x00
- [204] SUB
- [205] PUSH2 0x01f6
- [206] JUMPI
- [207] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [208] DUP6
- [209] AND
- [210] EXTCODESIZE
- [211] PUSH2 0x01f6
- [212] JUMPI
- [213] PUSH1 0x40
- [214] MLOAD
- [215] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
- [216] DUP2
- [217] MSTORE
- [218] PUSH1 0x20
- [219] PUSH1 0x04
- [220] DUP3
- [221] ADD
- [222] MSTORE
- [223] PUSH1 0x1d
- [224] PUSH1 0x24
- [225] DUP3
- [226] ADD
- [227] MSTORE
- [228] PUSH32 0x416464726573733a2063616c6c20746f206e6f6e2d636f6e7472616374000000
- [229] PUSH1 0x44
- [230] DUP3
- [231] ADD
- [232] MSTORE
- [233] PUSH1 0x64
- [234] ADD
- [235] JUMPDEST
- [236] PUSH1 0x40
- [237] MLOAD
- [238] DUP1
- [239] SWAP2
- [240] SUB
- [241] SWAP1
- [242] REVERT
- [243] JUMPDEST
- [244] POP
- [245] DUP2
- [246] PUSH2 0x0207
- [247] JUMP
- [248] JUMPDEST
- [249] PUSH2 0x0207
- [250] DUP4
- [251] DUP4
- [252] PUSH2 0x020f
- [253] JUMP
- [254] JUMPDEST
- [255] SWAP5
- [256] SWAP4
- [257] POP
- [258] POP
- [259] POP
- [260] POP
- [261] JUMP
- [262] JUMPDEST
- [263] DUP2
- [264] MLOAD
- [265] ISZERO
- [266] PUSH2 0x021f
- [267] JUMPI
- [268] DUP2
- [269] MLOAD
- [270] DUP1
- [271] DUP4
- [272] PUSH1 0x20
- [273] ADD
- [274] REVERT
- [275] JUMPDEST
- [276] DUP1
- [277] PUSH1 0x40
- [278] MLOAD
- [279] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
- [280] DUP2
- [281] MSTORE
- [282] PUSH1 0x04
- [283] ADD
- [284] PUSH2 0x01ed
- [285] SWAP2
- [286] SWAP1
- [287] PUSH2 0x0293
- [288] JUMP
- [289] JUMPDEST
- [290] PUSH1 0x00
- [291] JUMPDEST
- [292] DUP4
- [293] DUP2
- [294] LT
- [295] ISZERO
- [296] PUSH2 0x026e
- [297] JUMPI
- [298] DUP2
- [299] DUP2
- [300] ADD
- [301] MLOAD
- [302] DUP4
- [303] DUP3
- [304] ADD
- [305] MSTORE
- [306] PUSH1 0x20
- [307] ADD
- [308] PUSH2 0x0256
- [309] JUMP
- [310] JUMPDEST
- [311] POP
- [312] POP
- [313] PUSH1 0x00
- [314] SWAP2
- [315] ADD
- [316] MSTORE
- [317] JUMP
- [318] JUMPDEST
- [319] PUSH1 0x00
- [320] DUP3
- [321] MLOAD
- [322] PUSH2 0x0289
- [323] DUP2
- [324] DUP5
- [325] PUSH1 0x20
- [326] DUP8
- [327] ADD
- [328] PUSH2 0x0253
- [329] JUMP
- [330] JUMPDEST
- [331] SWAP2
- [332] SWAP1
- [333] SWAP2
- [334] ADD
- [335] SWAP3
- [336] SWAP2
- [337] POP
- [338] POP
- [339] JUMP
- [340] JUMPDEST
- [341] PUSH1 0x20
- [342] DUP2
- [343] MSTORE
- [344] PUSH1 0x00
- [345] DUP3
- [346] MLOAD
- [347] DUP1
- [348] PUSH1 0x20
- [349] DUP5
- [350] ADD
- [351] MSTORE
- [352] PUSH2 0x02b2
- [353] DUP2
- [354] PUSH1 0x40
- [355] DUP6
- [356] ADD
- [357] PUSH1 0x20
- [358] DUP8
- [359] ADD
- [360] PUSH2 0x0253
- [361] JUMP
- [362] JUMPDEST
- [363] PUSH1 0x1f
- [364] ADD
- [365] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe0
- [366] AND
- [367] SWAP2
- [368] SWAP1
- [369] SWAP2
- [370] ADD
- [371] PUSH1 0x40
- [372] ADD
- [373] SWAP3
- [374] SWAP2
- [375] POP
- [376] POP
- [377] JUMP
- [378] 'fe'(Unknown Opcode)
- [379] COINBASE
- [380] PUSH5 0x6472657373
- [381] GASPRICE
- [382] SHA3
- [383] PUSH13 0x6f772d6c6576656c2064656c65
- [384] PUSH8 0x6174652063616c6c
- [385] SHA3
- [386] PUSH7 0x61696c6564a264
- [387] PUSH10 0x70667358221220a7c6f2
- [388] 'fc'(Unknown Opcode)
- [389] 'b7'(Unknown Opcode)
- [390] DUP13
- [391] PUSH28 0x4c40d8fd8b3b79a2770d3af4a9e7da56689bfa5ce2c1ce5a2164736f