Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [1] PUSH1 0x80
- [3] PUSH1 0x40
- [4] MSTORE
- [5] CALLDATASIZE
- [8] PUSH2 0x0013
- [9] JUMPI
- [12] PUSH2 0x0011
- [15] PUSH2 0x0017
- [16] JUMP
- [17] JUMPDEST
- [18] STOP
- [19] JUMPDEST
- [22] PUSH2 0x0011
- [23] JUMPDEST
- [26] PUSH2 0x0027
- [29] PUSH2 0x0022
- [32] PUSH2 0x002f
- [33] JUMP
- [34] JUMPDEST
- [37] PUSH2 0x005f
- [38] JUMP
- [39] JUMPDEST
- [40] JUMP
- [41] JUMPDEST
- [42] EXTCODESIZE
- [43] ISZERO
- [44] ISZERO
- [45] SWAP1
- [46] JUMP
- [47] JUMPDEST
- [49] PUSH1 0x00
- [52] PUSH2 0x005a
- [85] PUSH32 0x000000000000000000000000969d515486ba6133400ac9c73298586426a090f5
- [88] PUSH2 0x0083
- [89] JUMP
- [90] JUMPDEST
- [91] SWAP1
- [92] POP
- [93] SWAP1
- [94] JUMP
- [95] JUMPDEST
- [96] CALLDATASIZE
- [98] PUSH1 0x00
- [99] DUP1
- [100] CALLDATACOPY
- [102] PUSH1 0x00
- [103] DUP1
- [104] CALLDATASIZE
- [106] PUSH1 0x00
- [107] DUP5
- [108] GAS
- [109] DELEGATECALL
- [110] RETURNDATASIZE
- [112] PUSH1 0x00
- [113] DUP1
- [114] RETURNDATACOPY
- [115] DUP1
- [116] DUP1
- [117] ISZERO
- [120] PUSH2 0x007e
- [121] JUMPI
- [122] RETURNDATASIZE
- [124] PUSH1 0x00
- [125] RETURN
- [126] JUMPDEST
- [127] RETURNDATASIZE
- [129] PUSH1 0x00
- [130] REVERT
- [131] JUMPDEST
- [133] PUSH1 0x40
- [134] MLOAD
- [136] PUSH1 0x00
- [137] SWAP1
- [138] DUP2
- [139] SWAP1
- [140] DUP2
- [141] SWAP1
- [162] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
- [163] DUP6
- [164] AND
- [165] SWAP1
- [166] DUP3
- [167] DUP2
- [168] DUP2
- [169] DUP2
- [170] DUP6
- [171] GAS
- [172] STATICCALL
- [173] SWAP2
- [174] POP
- [175] POP
- [176] RETURNDATASIZE
- [177] DUP1
- [179] PUSH1 0x00
- [180] DUP2
- [181] EQ
- [184] PUSH2 0x00db
- [185] JUMPI
- [187] PUSH1 0x40
- [188] MLOAD
- [189] SWAP2
- [190] POP
- [192] PUSH1 0x1f
- [193] NOT
- [195] PUSH1 0x3f
- [196] RETURNDATASIZE
- [197] ADD
- [198] AND
- [199] DUP3
- [200] ADD
- [202] PUSH1 0x40
- [203] MSTORE
- [204] RETURNDATASIZE
- [205] DUP3
- [206] MSTORE
- [207] RETURNDATASIZE
- [209] PUSH1 0x00
- [211] PUSH1 0x20
- [212] DUP5
- [213] ADD
- [214] RETURNDATACOPY
- [217] PUSH2 0x00e0
- [218] JUMP
- [219] JUMPDEST
- [221] PUSH1 0x60
- [222] SWAP2
- [223] POP
- [224] JUMPDEST
- [225] POP
- [226] SWAP2
- [227] POP
- [228] SWAP2
- [229] POP
- [230] DUP2
- [231] DUP2
- [232] SWAP1
- [235] PUSH2 0x018a
- [236] JUMPI
- [238] PUSH1 0x40
- [239] MLOAD
- [272] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
- [273] DUP2
- [274] MSTORE
- [276] PUSH1 0x04
- [277] ADD
- [278] DUP1
- [279] DUP1
- [281] PUSH1 0x20
- [282] ADD
- [283] DUP3
- [284] DUP2
- [285] SUB
- [286] DUP3
- [287] MSTORE
- [288] DUP4
- [289] DUP2
- [290] DUP2
- [291] MLOAD
- [292] DUP2
- [293] MSTORE
- [295] PUSH1 0x20
- [296] ADD
- [297] SWAP2
- [298] POP
- [299] DUP1
- [300] MLOAD
- [301] SWAP1
- [303] PUSH1 0x20
- [304] ADD
- [305] SWAP1
- [306] DUP1
- [307] DUP4
- [308] DUP4
- [310] PUSH1 0x00
- [311] JUMPDEST
- [312] DUP4
- [313] DUP2
- [314] LT
- [315] ISZERO
- [318] PUSH2 0x014f
- [319] JUMPI
- [320] DUP2
- [321] DUP2
- [322] ADD
- [323] MLOAD
- [324] DUP4
- [325] DUP3
- [326] ADD
- [327] MSTORE
- [329] PUSH1 0x20
- [330] ADD
- [333] PUSH2 0x0137
- [334] JUMP
- [335] JUMPDEST
- [336] POP
- [337] POP
- [338] POP
- [339] POP
- [340] SWAP1
- [341] POP
- [342] SWAP1
- [343] DUP2
- [344] ADD
- [345] SWAP1
- [347] PUSH1 0x1f
- [348] AND
- [349] DUP1
- [350] ISZERO
- [353] PUSH2 0x017c
- [354] JUMPI
- [355] DUP1
- [356] DUP3
- [357] SUB
- [358] DUP1
- [359] MLOAD
- [361] PUSH1 0x01
- [362] DUP4
- [364] PUSH1 0x20
- [365] SUB
- [368] PUSH2 0x0100
- [369] EXP
- [370] SUB
- [371] NOT
- [372] AND
- [373] DUP2
- [374] MSTORE
- [376] PUSH1 0x20
- [377] ADD
- [378] SWAP2
- [379] POP
- [380] JUMPDEST
- [381] POP
- [382] SWAP3
- [383] POP
- [384] POP
- [385] POP
- [387] PUSH1 0x40
- [388] MLOAD
- [389] DUP1
- [390] SWAP2
- [391] SUB
- [392] SWAP1
- [393] REVERT
- [394] JUMPDEST
- [395] POP
- [396] DUP1
- [397] DUP1
- [399] PUSH1 0x20
- [400] ADD
- [401] SWAP1
- [402] MLOAD
- [404] PUSH1 0x20
- [405] DUP2
- [406] LT
- [407] ISZERO
- [410] PUSH2 0x01a0
- [411] JUMPI
- [413] PUSH1 0x00
- [414] DUP1
- [415] REVERT
- [416] JUMPDEST
- [417] POP
- [418] MLOAD
- [419] SWAP5
- [420] SWAP4
- [421] POP
- [422] POP
- [423] POP
- [424] POP
- [425] JUMP
- [426] 'fe'(Unknown Opcode)
- [427] LOG2
- [433] PUSH5 0x6970667358
- [434] '22'(Unknown Opcode)
- [435] SLT
- [436] SHA3
- [464] PUSH27 0x913a499405f220fe73d6c33af6d31fa3d6dd38aef5fe5d04381845
- [465] JUMPDEST
- [466] DUP12
- [467] 'd5'(Unknown Opcode)
- [468] '5c'(Unknown Opcode)
- [474] PUSH5 0x736f6c6343
- [475] STOP
- [476] SMOD
- [477] MOD
- [478] STOP
- [479] CALLER