Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLDATASIZE
- [4] PUSH2 0x0013
- [5] JUMPI
- [6] PUSH2 0x0011
- [7] PUSH2 0x0017
- [8] JUMP
- [9] JUMPDEST
- [10] STOP
- [11] JUMPDEST
- [12] PUSH2 0x0011
- [13] JUMPDEST
- [14] PUSH2 0x0027
- [15] PUSH2 0x0022
- [16] PUSH2 0x005e
- [17] JUMP
- [18] JUMPDEST
- [19] PUSH2 0x0096
- [20] JUMP
- [21] JUMPDEST
- [22] JUMP
- [23] JUMPDEST
- [24] PUSH1 0x60
- [25] PUSH2 0x004e
- [26] DUP4
- [27] DUP4
- [28] PUSH1 0x40
- [29] MLOAD
- [30] DUP1
- [31] PUSH1 0x60
- [32] ADD
- [33] PUSH1 0x40
- [34] MSTORE
- [35] DUP1
- [36] PUSH1 0x27
- [37] DUP2
- [38] MSTORE
- [39] PUSH1 0x20
- [40] ADD
- [41] PUSH2 0x024c
- [42] PUSH1 0x27
- [43] SWAP2
- [44] CODECOPY
- [45] PUSH2 0x00ba
- [46] JUMP
- [47] JUMPDEST
- [48] SWAP4
- [49] SWAP3
- [50] POP
- [51] POP
- [52] POP
- [53] JUMP
- [54] JUMPDEST
- [55] EXTCODESIZE
- [56] ISZERO
- [57] ISZERO
- [58] SWAP1
- [59] JUMP
- [60] JUMPDEST
- [61] SWAP1
- [62] JUMP
- [63] JUMPDEST
- [64] PUSH1 0x00
- [65] PUSH2 0x0091
- [66] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
- [67] SLOAD
- [68] PUSH1 0x01
- [69] PUSH1 0x01
- [70] PUSH1 0xa0
- [71] SHL
- [72] SUB
- [73] AND
- [74] SWAP1
- [75] JUMP
- [76] JUMPDEST
- [77] SWAP1
- [78] POP
- [79] SWAP1
- [80] JUMP
- [81] JUMPDEST
- [82] CALLDATASIZE
- [83] PUSH1 0x00
- [84] DUP1
- [85] CALLDATACOPY
- [86] PUSH1 0x00
- [87] DUP1
- [88] CALLDATASIZE
- [89] PUSH1 0x00
- [90] DUP5
- [91] GAS
- [92] DELEGATECALL
- [93] RETURNDATASIZE
- [94] PUSH1 0x00
- [95] DUP1
- [96] RETURNDATACOPY
- [97] DUP1
- [98] DUP1
- [99] ISZERO
- [100] PUSH2 0x00b5
- [101] JUMPI
- [102] RETURNDATASIZE
- [103] PUSH1 0x00
- [104] RETURN
- [105] JUMPDEST
- [106] RETURNDATASIZE
- [107] PUSH1 0x00
- [108] REVERT
- [109] JUMPDEST
- [110] PUSH1 0x60
- [111] DUP4
- [112] EXTCODESIZE
- [113] PUSH2 0x011e
- [114] JUMPI
- [115] PUSH1 0x40
- [116] MLOAD
- [117] PUSH3 0x461bcd
- [118] PUSH1 0xe5
- [119] SHL
- [120] DUP2
- [121] MSTORE
- [122] PUSH1 0x20
- [123] PUSH1 0x04
- [124] DUP3
- [125] ADD
- [126] MSTORE
- [127] PUSH1 0x26
- [128] PUSH1 0x24
- [129] DUP3
- [130] ADD
- [131] MSTORE
- [132] PUSH32 0x416464726573733a2064656c65676174652063616c6c20746f206e6f6e2d636f
- [133] PUSH1 0x44
- [134] DUP3
- [135] ADD
- [136] MSTORE
- [137] PUSH6 0x1b9d1c9858dd
- [138] PUSH1 0xd2
- [139] SHL
- [140] PUSH1 0x64
- [141] DUP3
- [142] ADD
- [143] MSTORE
- [144] PUSH1 0x84
- [145] ADD
- [146] JUMPDEST
- [147] PUSH1 0x40
- [148] MLOAD
- [149] DUP1
- [150] SWAP2
- [151] SUB
- [152] SWAP1
- [153] REVERT
- [154] JUMPDEST
- [155] PUSH1 0x00
- [156] DUP1
- [157] DUP6
- [158] PUSH1 0x01
- [159] PUSH1 0x01
- [160] PUSH1 0xa0
- [161] SHL
- [162] SUB
- [163] AND
- [164] DUP6
- [165] PUSH1 0x40
- [166] MLOAD
- [167] PUSH2 0x0139
- [168] SWAP2
- [169] SWAP1
- [170] PUSH2 0x01cc
- [171] JUMP
- [172] JUMPDEST
- [173] PUSH1 0x00
- [174] PUSH1 0x40
- [175] MLOAD
- [176] DUP1
- [177] DUP4
- [178] SUB
- [179] DUP2
- [180] DUP6
- [181] GAS
- [182] DELEGATECALL
- [183] SWAP2
- [184] POP
- [185] POP
- [186] RETURNDATASIZE
- [187] DUP1
- [188] PUSH1 0x00
- [189] DUP2
- [190] EQ
- [191] PUSH2 0x0174
- [192] JUMPI
- [193] PUSH1 0x40
- [194] MLOAD
- [195] SWAP2
- [196] POP
- [197] PUSH1 0x1f
- [198] NOT
- [199] PUSH1 0x3f
- [200] RETURNDATASIZE
- [201] ADD
- [202] AND
- [203] DUP3
- [204] ADD
- [205] PUSH1 0x40
- [206] MSTORE
- [207] RETURNDATASIZE
- [208] DUP3
- [209] MSTORE
- [210] RETURNDATASIZE
- [211] PUSH1 0x00
- [212] PUSH1 0x20
- [213] DUP5
- [214] ADD
- [215] RETURNDATACOPY
- [216] PUSH2 0x0179
- [217] JUMP
- [218] JUMPDEST
- [219] PUSH1 0x60
- [220] SWAP2
- [221] POP
- [222] JUMPDEST
- [223] POP
- [224] SWAP2
- [225] POP
- [226] SWAP2
- [227] POP
- [228] PUSH2 0x0189
- [229] DUP3
- [230] DUP3
- [231] DUP7
- [232] PUSH2 0x0193
- [233] JUMP
- [234] JUMPDEST
- [235] SWAP7
- [236] SWAP6
- [237] POP
- [238] POP
- [239] POP
- [240] POP
- [241] POP
- [242] POP
- [243] JUMP
- [244] JUMPDEST
- [245] PUSH1 0x60
- [246] DUP4
- [247] ISZERO
- [248] PUSH2 0x01a2
- [249] JUMPI
- [250] POP
- [251] DUP2
- [252] PUSH2 0x004e
- [253] JUMP
- [254] JUMPDEST
- [255] DUP3
- [256] MLOAD
- [257] ISZERO
- [258] PUSH2 0x01b2
- [259] JUMPI
- [260] DUP3
- [261] MLOAD
- [262] DUP1
- [263] DUP5
- [264] PUSH1 0x20
- [265] ADD
- [266] REVERT
- [267] JUMPDEST
- [268] DUP2
- [269] PUSH1 0x40
- [270] MLOAD
- [271] PUSH3 0x461bcd
- [272] PUSH1 0xe5
- [273] SHL
- [274] DUP2
- [275] MSTORE
- [276] PUSH1 0x04
- [277] ADD
- [278] PUSH2 0x0115
- [279] SWAP2
- [280] SWAP1
- [281] PUSH2 0x01e8
- [282] JUMP
- [283] JUMPDEST
- [284] PUSH1 0x00
- [285] DUP3
- [286] MLOAD
- [287] PUSH2 0x01de
- [288] DUP2
- [289] DUP5
- [290] PUSH1 0x20
- [291] DUP8
- [292] ADD
- [293] PUSH2 0x021b
- [294] JUMP
- [295] JUMPDEST
- [296] SWAP2
- [297] SWAP1
- [298] SWAP2
- [299] ADD
- [300] SWAP3
- [301] SWAP2
- [302] POP
- [303] POP
- [304] JUMP
- [305] JUMPDEST
- [306] PUSH1 0x00
- [307] PUSH1 0x20
- [308] DUP3
- [309] MSTORE
- [310] DUP3
- [311] MLOAD
- [312] DUP1
- [313] PUSH1 0x20
- [314] DUP5
- [315] ADD
- [316] MSTORE
- [317] PUSH2 0x0207
- [318] DUP2
- [319] PUSH1 0x40
- [320] DUP6
- [321] ADD
- [322] PUSH1 0x20
- [323] DUP8
- [324] ADD
- [325] PUSH2 0x021b
- [326] JUMP
- [327] JUMPDEST
- [328] PUSH1 0x1f
- [329] ADD
- [330] PUSH1 0x1f
- [331] NOT
- [332] AND
- [333] SWAP2
- [334] SWAP1
- [335] SWAP2
- [336] ADD
- [337] PUSH1 0x40
- [338] ADD
- [339] SWAP3
- [340] SWAP2
- [341] POP
- [342] POP
- [343] JUMP
- [344] JUMPDEST
- [345] PUSH1 0x00
- [346] JUMPDEST
- [347] DUP4
- [348] DUP2
- [349] LT
- [350] ISZERO
- [351] PUSH2 0x0236
- [352] JUMPI
- [353] DUP2
- [354] DUP2
- [355] ADD
- [356] MLOAD
- [357] DUP4
- [358] DUP3
- [359] ADD
- [360] MSTORE
- [361] PUSH1 0x20
- [362] ADD
- [363] PUSH2 0x021e
- [364] JUMP
- [365] JUMPDEST
- [366] DUP4
- [367] DUP2
- [368] GT
- [369] ISZERO
- [370] PUSH2 0x0245
- [371] JUMPI
- [372] PUSH1 0x00
- [373] DUP5
- [374] DUP5
- [375] ADD
- [376] MSTORE
- [377] JUMPDEST
- [378] POP
- [379] POP
- [380] POP
- [381] POP
- [382] JUMP
- [383] 'fe'(Unknown Opcode)
- [384] COINBASE
- [385] PUSH5 0x6472657373
- [386] GASPRICE
- [387] SHA3
- [388] PUSH13 0x6f772d6c6576656c2064656c65
- [389] PUSH8 0x6174652063616c6c
- [390] SHA3
- [391] PUSH7 0x61696c6564a264
- [392] PUSH10 0x706673582212209b8470
- [393] CREATE
- [394] PUSH15 0x8a3960c912103fc2be177edaad6958
- [395] '4e'(Unknown Opcode)
- [396] 'e3'(Unknown Opcode)
- [397] 'c7'(Unknown Opcode)
- [398] 'd2'(Unknown Opcode)
- [399] DUP1
- [400] SWAP15
- [401] 'e7'(Unknown Opcode)
- [402] CALLDATACOPY
- [403] 'e7'(Unknown Opcode)
- [404] SWAP5
- [405] ADDMOD
- [406] 'e7'(Unknown Opcode)
- [407] PUSH5 0x736f6c6343
- [408] STOP
- [409] ADDMOD
- [410] MUL
- [411] STOP
- [412] CALLER