Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] PUSH1 0x00
- [4] CALLDATASIZE
- [5] PUSH1 0x60
- [6] PUSH1 0x00
- [7] DUP1
- [8] PUSH20 0xd7ef3aad2be0999be362e5cec0c1796af25d9b77
- [9] PUSH1 0x01
- [10] PUSH1 0x01
- [11] PUSH1 0xa0
- [12] SHL
- [13] SUB
- [14] AND
- [15] DUP6
- [16] DUP6
- [17] PUSH1 0x40
- [18] MLOAD
- [19] PUSH1 0x38
- [20] SWAP3
- [21] SWAP2
- [22] SWAP1
- [23] PUSH1 0xce
- [24] JUMP
- [25] JUMPDEST
- [26] PUSH1 0x00
- [27] PUSH1 0x40
- [28] MLOAD
- [29] DUP1
- [30] DUP4
- [31] SUB
- [32] DUP2
- [33] DUP6
- [34] GAS
- [35] DELEGATECALL
- [36] SWAP2
- [37] POP
- [38] POP
- [39] RETURNDATASIZE
- [40] DUP1
- [41] PUSH1 0x00
- [42] DUP2
- [43] EQ
- [44] PUSH1 0x71
- [45] JUMPI
- [46] PUSH1 0x40
- [47] MLOAD
- [48] SWAP2
- [49] POP
- [50] PUSH1 0x1f
- [51] NOT
- [52] PUSH1 0x3f
- [53] RETURNDATASIZE
- [54] ADD
- [55] AND
- [56] DUP3
- [57] ADD
- [58] PUSH1 0x40
- [59] MSTORE
- [60] RETURNDATASIZE
- [61] DUP3
- [62] MSTORE
- [63] RETURNDATASIZE
- [64] PUSH1 0x00
- [65] PUSH1 0x20
- [66] DUP5
- [67] ADD
- [68] RETURNDATACOPY
- [69] PUSH1 0x76
- [70] JUMP
- [71] JUMPDEST
- [72] PUSH1 0x60
- [73] SWAP2
- [74] POP
- [75] JUMPDEST
- [76] POP
- [77] SWAP2
- [78] POP
- [79] SWAP2
- [80] POP
- [81] DUP2
- [82] PUSH1 0xc1
- [83] JUMPI
- [84] PUSH1 0x40
- [85] MLOAD
- [86] PUSH3 0x461bcd
- [87] PUSH1 0xe5
- [88] SHL
- [89] DUP2
- [90] MSTORE
- [91] PUSH1 0x20
- [92] PUSH1 0x04
- [93] DUP3
- [94] ADD
- [95] MSTORE
- [96] PUSH1 0x13
- [97] PUSH1 0x24
- [98] DUP3
- [99] ADD
- [100] MSTORE
- [101] PUSH19 0x151a1a5cc8125d195b481a5cc8131bd8dad959
- [102] PUSH1 0x6a
- [103] SHL
- [104] PUSH1 0x44
- [105] DUP3
- [106] ADD
- [107] MSTORE
- [108] PUSH1 0x64
- [109] ADD
- [110] PUSH1 0x40
- [111] MLOAD
- [112] DUP1
- [113] SWAP2
- [114] SUB
- [115] SWAP1
- [116] REVERT
- [117] JUMPDEST
- [118] DUP1
- [119] MLOAD
- [120] SWAP5
- [121] POP
- [122] PUSH1 0x20
- [123] ADD
- [124] SWAP3
- [125] POP
- [126] POP
- [127] POP
- [128] RETURN
- [129] JUMPDEST
- [130] DUP2
- [131] DUP4
- [132] DUP3
- [133] CALLDATACOPY
- [134] PUSH1 0x00
- [135] SWAP2
- [136] ADD
- [137] SWAP1
- [138] DUP2
- [139] MSTORE
- [140] SWAP2
- [141] SWAP1
- [142] POP
- [143] JUMP
- [144] 'fe'(Unknown Opcode)
- [145] LOG2
- [146] PUSH5 0x6970667358
- [147] '22'(Unknown Opcode)
- [148] SLT
- [149] SHA3
- [150] PUSH9 0xdc62602a2ac52584ed
- [151] 'a5'(Unknown Opcode)
- [152] PUSH25 0x8b9cb9bd1bdedb96931868e8d0ca9efe8e3e28a464736f6c63
- [153] NUMBER
- [154] STOP
- [155] ADDMOD
- [156] '0d'(Unknown Opcode)
- [157] STOP
- [158] CALLER