GLMR Price: $0.52 (-2.20%)
Gas: 151 GWei

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [1] PUSH1 0x80
  • [3] PUSH1 0x40
  • [4] MSTORE
  • [5] CALLDATASIZE
  • [8] PUSH2 0x0013
  • [9] JUMPI
  • [12] PUSH2 0x0011
  • [15] PUSH2 0x0017
  • [16] JUMP
  • [17] JUMPDEST
  • [18] STOP
  • [19] JUMPDEST
  • [22] PUSH2 0x0011
  • [23] JUMPDEST
  • [26] PUSH2 0x0027
  • [29] PUSH2 0x0022
  • [32] PUSH2 0x002f
  • [33] JUMP
  • [34] JUMPDEST
  • [37] PUSH2 0x005f
  • [38] JUMP
  • [39] JUMPDEST
  • [40] JUMP
  • [41] JUMPDEST
  • [42] EXTCODESIZE
  • [43] ISZERO
  • [44] ISZERO
  • [45] SWAP1
  • [46] JUMP
  • [47] JUMPDEST
  • [49] PUSH1 0x00
  • [52] PUSH2 0x005a
  • [85] PUSH32 0x000000000000000000000000969d515486ba6133400ac9c73298586426a090f5
  • [88] PUSH2 0x0083
  • [89] JUMP
  • [90] JUMPDEST
  • [91] SWAP1
  • [92] POP
  • [93] SWAP1
  • [94] JUMP
  • [95] JUMPDEST
  • [96] CALLDATASIZE
  • [98] PUSH1 0x00
  • [99] DUP1
  • [100] CALLDATACOPY
  • [102] PUSH1 0x00
  • [103] DUP1
  • [104] CALLDATASIZE
  • [106] PUSH1 0x00
  • [107] DUP5
  • [108] GAS
  • [109] DELEGATECALL
  • [110] RETURNDATASIZE
  • [112] PUSH1 0x00
  • [113] DUP1
  • [114] RETURNDATACOPY
  • [115] DUP1
  • [116] DUP1
  • [117] ISZERO
  • [120] PUSH2 0x007e
  • [121] JUMPI
  • [122] RETURNDATASIZE
  • [124] PUSH1 0x00
  • [125] RETURN
  • [126] JUMPDEST
  • [127] RETURNDATASIZE
  • [129] PUSH1 0x00
  • [130] REVERT
  • [131] JUMPDEST
  • [133] PUSH1 0x40
  • [134] MLOAD
  • [136] PUSH1 0x00
  • [137] SWAP1
  • [138] DUP2
  • [139] SWAP1
  • [140] DUP2
  • [141] SWAP1
  • [162] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [163] DUP6
  • [164] AND
  • [165] SWAP1
  • [166] DUP3
  • [167] DUP2
  • [168] DUP2
  • [169] DUP2
  • [170] DUP6
  • [171] GAS
  • [172] STATICCALL
  • [173] SWAP2
  • [174] POP
  • [175] POP
  • [176] RETURNDATASIZE
  • [177] DUP1
  • [179] PUSH1 0x00
  • [180] DUP2
  • [181] EQ
  • [184] PUSH2 0x00db
  • [185] JUMPI
  • [187] PUSH1 0x40
  • [188] MLOAD
  • [189] SWAP2
  • [190] POP
  • [192] PUSH1 0x1f
  • [193] NOT
  • [195] PUSH1 0x3f
  • [196] RETURNDATASIZE
  • [197] ADD
  • [198] AND
  • [199] DUP3
  • [200] ADD
  • [202] PUSH1 0x40
  • [203] MSTORE
  • [204] RETURNDATASIZE
  • [205] DUP3
  • [206] MSTORE
  • [207] RETURNDATASIZE
  • [209] PUSH1 0x00
  • [211] PUSH1 0x20
  • [212] DUP5
  • [213] ADD
  • [214] RETURNDATACOPY
  • [217] PUSH2 0x00e0
  • [218] JUMP
  • [219] JUMPDEST
  • [221] PUSH1 0x60
  • [222] SWAP2
  • [223] POP
  • [224] JUMPDEST
  • [225] POP
  • [226] SWAP2
  • [227] POP
  • [228] SWAP2
  • [229] POP
  • [230] DUP2
  • [231] DUP2
  • [232] SWAP1
  • [235] PUSH2 0x018a
  • [236] JUMPI
  • [238] PUSH1 0x40
  • [239] MLOAD
  • [272] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
  • [273] DUP2
  • [274] MSTORE
  • [276] PUSH1 0x04
  • [277] ADD
  • [278] DUP1
  • [279] DUP1
  • [281] PUSH1 0x20
  • [282] ADD
  • [283] DUP3
  • [284] DUP2
  • [285] SUB
  • [286] DUP3
  • [287] MSTORE
  • [288] DUP4
  • [289] DUP2
  • [290] DUP2
  • [291] MLOAD
  • [292] DUP2
  • [293] MSTORE
  • [295] PUSH1 0x20
  • [296] ADD
  • [297] SWAP2
  • [298] POP
  • [299] DUP1
  • [300] MLOAD
  • [301] SWAP1
  • [303] PUSH1 0x20
  • [304] ADD
  • [305] SWAP1
  • [306] DUP1
  • [307] DUP4
  • [308] DUP4
  • [310] PUSH1 0x00
  • [311] JUMPDEST
  • [312] DUP4
  • [313] DUP2
  • [314] LT
  • [315] ISZERO
  • [318] PUSH2 0x014f
  • [319] JUMPI
  • [320] DUP2
  • [321] DUP2
  • [322] ADD
  • [323] MLOAD
  • [324] DUP4
  • [325] DUP3
  • [326] ADD
  • [327] MSTORE
  • [329] PUSH1 0x20
  • [330] ADD
  • [333] PUSH2 0x0137
  • [334] JUMP
  • [335] JUMPDEST
  • [336] POP
  • [337] POP
  • [338] POP
  • [339] POP
  • [340] SWAP1
  • [341] POP
  • [342] SWAP1
  • [343] DUP2
  • [344] ADD
  • [345] SWAP1
  • [347] PUSH1 0x1f
  • [348] AND
  • [349] DUP1
  • [350] ISZERO
  • [353] PUSH2 0x017c
  • [354] JUMPI
  • [355] DUP1
  • [356] DUP3
  • [357] SUB
  • [358] DUP1
  • [359] MLOAD
  • [361] PUSH1 0x01
  • [362] DUP4
  • [364] PUSH1 0x20
  • [365] SUB
  • [368] PUSH2 0x0100
  • [369] EXP
  • [370] SUB
  • [371] NOT
  • [372] AND
  • [373] DUP2
  • [374] MSTORE
  • [376] PUSH1 0x20
  • [377] ADD
  • [378] SWAP2
  • [379] POP
  • [380] JUMPDEST
  • [381] POP
  • [382] SWAP3
  • [383] POP
  • [384] POP
  • [385] POP
  • [387] PUSH1 0x40
  • [388] MLOAD
  • [389] DUP1
  • [390] SWAP2
  • [391] SUB
  • [392] SWAP1
  • [393] REVERT
  • [394] JUMPDEST
  • [395] POP
  • [396] DUP1
  • [397] DUP1
  • [399] PUSH1 0x20
  • [400] ADD
  • [401] SWAP1
  • [402] MLOAD
  • [404] PUSH1 0x20
  • [405] DUP2
  • [406] LT
  • [407] ISZERO
  • [410] PUSH2 0x01a0
  • [411] JUMPI
  • [413] PUSH1 0x00
  • [414] DUP1
  • [415] REVERT
  • [416] JUMPDEST
  • [417] POP
  • [418] MLOAD
  • [419] SWAP5
  • [420] SWAP4
  • [421] POP
  • [422] POP
  • [423] POP
  • [424] POP
  • [425] JUMP
  • [426] 'fe'(Unknown Opcode)
  • [427] LOG2
  • [433] PUSH5 0x6970667358
  • [434] '22'(Unknown Opcode)
  • [435] SLT
  • [436] SHA3
  • [464] PUSH27 0x913a499405f220fe73d6c33af6d31fa3d6dd38aef5fe5d04381845
  • [465] JUMPDEST
  • [466] DUP12
  • [467] 'd5'(Unknown Opcode)
  • [468] '5c'(Unknown Opcode)
  • [474] PUSH5 0x736f6c6343
  • [475] STOP
  • [476] SMOD
  • [477] MOD
  • [478] STOP
  • [479] CALLER