Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [0] PUSH1 0x80
- [1] PUSH1 0x40
- [2] MSTORE
- [3] CALLDATASIZE
- [4] PUSH2 0x0013
- [5] JUMPI
- [6] PUSH2 0x0011
- [7] PUSH2 0x0017
- [8] JUMP
- [9] JUMPDEST
- [10] STOP
- [11] JUMPDEST
- [12] PUSH2 0x0011
- [13] JUMPDEST
- [14] PUSH2 0x0027
- [15] PUSH2 0x0022
- [16] PUSH2 0x005e
- [17] JUMP
- [18] JUMPDEST
- [19] PUSH2 0x00f7
- [20] JUMP
- [21] JUMPDEST
- [22] JUMP
- [23] JUMPDEST
- [24] PUSH1 0x60
- [25] PUSH2 0x004e
- [26] DUP4
- [27] DUP4
- [28] PUSH1 0x40
- [29] MLOAD
- [30] DUP1
- [31] PUSH1 0x60
- [32] ADD
- [33] PUSH1 0x40
- [34] MSTORE
- [35] DUP1
- [36] PUSH1 0x27
- [37] DUP2
- [38] MSTORE
- [39] PUSH1 0x20
- [40] ADD
- [41] PUSH2 0x02ca
- [42] PUSH1 0x27
- [43] SWAP2
- [44] CODECOPY
- [45] PUSH2 0x011b
- [46] JUMP
- [47] JUMPDEST
- [48] SWAP4
- [49] SWAP3
- [50] POP
- [51] POP
- [52] POP
- [53] JUMP
- [54] JUMPDEST
- [55] EXTCODESIZE
- [56] ISZERO
- [57] ISZERO
- [58] SWAP1
- [59] JUMP
- [60] JUMPDEST
- [61] SWAP1
- [62] JUMP
- [63] JUMPDEST
- [64] PUSH1 0x00
- [65] PUSH2 0x0091
- [66] PUSH32 0xa3f0ad74e5423aebfd80d3ef4346578335a9a72aeaee59ff6cb3582b35133d50
- [67] SLOAD
- [68] PUSH1 0x01
- [69] PUSH1 0x01
- [70] PUSH1 0xa0
- [71] SHL
- [72] SUB
- [73] AND
- [74] SWAP1
- [75] JUMP
- [76] JUMPDEST
- [77] PUSH1 0x01
- [78] PUSH1 0x01
- [79] PUSH1 0xa0
- [80] SHL
- [81] SUB
- [82] AND
- [83] PUSH4 0x5c60da1b
- [84] PUSH1 0x40
- [85] MLOAD
- [86] DUP2
- [87] PUSH4 0xffffffff
- [88] AND
- [89] PUSH1 0xe0
- [90] SHL
- [91] DUP2
- [92] MSTORE
- [93] PUSH1 0x04
- [94] ADD
- [95] PUSH1 0x20
- [96] PUSH1 0x40
- [97] MLOAD
- [98] DUP1
- [99] DUP4
- [100] SUB
- [101] DUP2
- [102] DUP7
- [103] GAS
- [104] STATICCALL
- [105] ISZERO
- [106] DUP1
- [107] ISZERO
- [108] PUSH2 0x00ce
- [109] JUMPI
- [110] RETURNDATASIZE
- [111] PUSH1 0x00
- [112] DUP1
- [113] RETURNDATACOPY
- [114] RETURNDATASIZE
- [115] PUSH1 0x00
- [116] REVERT
- [117] JUMPDEST
- [118] POP
- [119] POP
- [120] POP
- [121] POP
- [122] PUSH1 0x40
- [123] MLOAD
- [124] RETURNDATASIZE
- [125] PUSH1 0x1f
- [126] NOT
- [127] PUSH1 0x1f
- [128] DUP3
- [129] ADD
- [130] AND
- [131] DUP3
- [132] ADD
- [133] DUP1
- [134] PUSH1 0x40
- [135] MSTORE
- [136] POP
- [137] DUP2
- [138] ADD
- [139] SWAP1
- [140] PUSH2 0x00f2
- [141] SWAP2
- [142] SWAP1
- [143] PUSH2 0x022d
- [144] JUMP
- [145] JUMPDEST
- [146] SWAP1
- [147] POP
- [148] SWAP1
- [149] JUMP
- [150] JUMPDEST
- [151] CALLDATASIZE
- [152] PUSH1 0x00
- [153] DUP1
- [154] CALLDATACOPY
- [155] PUSH1 0x00
- [156] DUP1
- [157] CALLDATASIZE
- [158] PUSH1 0x00
- [159] DUP5
- [160] GAS
- [161] DELEGATECALL
- [162] RETURNDATASIZE
- [163] PUSH1 0x00
- [164] DUP1
- [165] RETURNDATACOPY
- [166] DUP1
- [167] DUP1
- [168] ISZERO
- [169] PUSH2 0x0116
- [170] JUMPI
- [171] RETURNDATASIZE
- [172] PUSH1 0x00
- [173] RETURN
- [174] JUMPDEST
- [175] RETURNDATASIZE
- [176] PUSH1 0x00
- [177] REVERT
- [178] JUMPDEST
- [179] PUSH1 0x60
- [180] DUP4
- [181] EXTCODESIZE
- [182] PUSH2 0x017f
- [183] JUMPI
- [184] PUSH1 0x40
- [185] MLOAD
- [186] PUSH3 0x461bcd
- [187] PUSH1 0xe5
- [188] SHL
- [189] DUP2
- [190] MSTORE
- [191] PUSH1 0x20
- [192] PUSH1 0x04
- [193] DUP3
- [194] ADD
- [195] MSTORE
- [196] PUSH1 0x26
- [197] PUSH1 0x24
- [198] DUP3
- [199] ADD
- [200] MSTORE
- [201] PUSH32 0x416464726573733a2064656c65676174652063616c6c20746f206e6f6e2d636f
- [202] PUSH1 0x44
- [203] DUP3
- [204] ADD
- [205] MSTORE
- [206] PUSH6 0x1b9d1c9858dd
- [207] PUSH1 0xd2
- [208] SHL
- [209] PUSH1 0x64
- [210] DUP3
- [211] ADD
- [212] MSTORE
- [213] PUSH1 0x84
- [214] ADD
- [215] JUMPDEST
- [216] PUSH1 0x40
- [217] MLOAD
- [218] DUP1
- [219] SWAP2
- [220] SUB
- [221] SWAP1
- [222] REVERT
- [223] JUMPDEST
- [224] PUSH1 0x00
- [225] DUP1
- [226] DUP6
- [227] PUSH1 0x01
- [228] PUSH1 0x01
- [229] PUSH1 0xa0
- [230] SHL
- [231] SUB
- [232] AND
- [233] DUP6
- [234] PUSH1 0x40
- [235] MLOAD
- [236] PUSH2 0x019a
- [237] SWAP2
- [238] SWAP1
- [239] PUSH2 0x027a
- [240] JUMP
- [241] JUMPDEST
- [242] PUSH1 0x00
- [243] PUSH1 0x40
- [244] MLOAD
- [245] DUP1
- [246] DUP4
- [247] SUB
- [248] DUP2
- [249] DUP6
- [250] GAS
- [251] DELEGATECALL
- [252] SWAP2
- [253] POP
- [254] POP
- [255] RETURNDATASIZE
- [256] DUP1
- [257] PUSH1 0x00
- [258] DUP2
- [259] EQ
- [260] PUSH2 0x01d5
- [261] JUMPI
- [262] PUSH1 0x40
- [263] MLOAD
- [264] SWAP2
- [265] POP
- [266] PUSH1 0x1f
- [267] NOT
- [268] PUSH1 0x3f
- [269] RETURNDATASIZE
- [270] ADD
- [271] AND
- [272] DUP3
- [273] ADD
- [274] PUSH1 0x40
- [275] MSTORE
- [276] RETURNDATASIZE
- [277] DUP3
- [278] MSTORE
- [279] RETURNDATASIZE
- [280] PUSH1 0x00
- [281] PUSH1 0x20
- [282] DUP5
- [283] ADD
- [284] RETURNDATACOPY
- [285] PUSH2 0x01da
- [286] JUMP
- [287] JUMPDEST
- [288] PUSH1 0x60
- [289] SWAP2
- [290] POP
- [291] JUMPDEST
- [292] POP
- [293] SWAP2
- [294] POP
- [295] SWAP2
- [296] POP
- [297] PUSH2 0x01ea
- [298] DUP3
- [299] DUP3
- [300] DUP7
- [301] PUSH2 0x01f4
- [302] JUMP
- [303] JUMPDEST
- [304] SWAP7
- [305] SWAP6
- [306] POP
- [307] POP
- [308] POP
- [309] POP
- [310] POP
- [311] POP
- [312] JUMP
- [313] JUMPDEST
- [314] PUSH1 0x60
- [315] DUP4
- [316] ISZERO
- [317] PUSH2 0x0203
- [318] JUMPI
- [319] POP
- [320] DUP2
- [321] PUSH2 0x004e
- [322] JUMP
- [323] JUMPDEST
- [324] DUP3
- [325] MLOAD
- [326] ISZERO
- [327] PUSH2 0x0213
- [328] JUMPI
- [329] DUP3
- [330] MLOAD
- [331] DUP1
- [332] DUP5
- [333] PUSH1 0x20
- [334] ADD
- [335] REVERT
- [336] JUMPDEST
- [337] DUP2
- [338] PUSH1 0x40
- [339] MLOAD
- [340] PUSH3 0x461bcd
- [341] PUSH1 0xe5
- [342] SHL
- [343] DUP2
- [344] MSTORE
- [345] PUSH1 0x04
- [346] ADD
- [347] PUSH2 0x0176
- [348] SWAP2
- [349] SWAP1
- [350] PUSH2 0x0296
- [351] JUMP
- [352] JUMPDEST
- [353] PUSH1 0x00
- [354] PUSH1 0x20
- [355] DUP3
- [356] DUP5
- [357] SUB
- [358] SLT
- [359] ISZERO
- [360] PUSH2 0x023f
- [361] JUMPI
- [362] PUSH1 0x00
- [363] DUP1
- [364] REVERT
- [365] JUMPDEST
- [366] DUP2
- [367] MLOAD
- [368] PUSH1 0x01
- [369] PUSH1 0x01
- [370] PUSH1 0xa0
- [371] SHL
- [372] SUB
- [373] DUP2
- [374] AND
- [375] DUP2
- [376] EQ
- [377] PUSH2 0x004e
- [378] JUMPI
- [379] PUSH1 0x00
- [380] DUP1
- [381] REVERT
- [382] JUMPDEST
- [383] PUSH1 0x00
- [384] JUMPDEST
- [385] DUP4
- [386] DUP2
- [387] LT
- [388] ISZERO
- [389] PUSH2 0x0271
- [390] JUMPI
- [391] DUP2
- [392] DUP2
- [393] ADD
- [394] MLOAD
- [395] DUP4
- [396] DUP3
- [397] ADD
- [398] MSTORE
- [399] PUSH1 0x20
- [400] ADD
- [401] PUSH2 0x0259
- [402] JUMP
- [403] JUMPDEST
- [404] POP
- [405] POP
- [406] PUSH1 0x00
- [407] SWAP2
- [408] ADD
- [409] MSTORE
- [410] JUMP
- [411] JUMPDEST
- [412] PUSH1 0x00
- [413] DUP3
- [414] MLOAD
- [415] PUSH2 0x028c
- [416] DUP2
- [417] DUP5
- [418] PUSH1 0x20
- [419] DUP8
- [420] ADD
- [421] PUSH2 0x0256
- [422] JUMP
- [423] JUMPDEST
- [424] SWAP2
- [425] SWAP1
- [426] SWAP2
- [427] ADD
- [428] SWAP3
- [429] SWAP2
- [430] POP
- [431] POP
- [432] JUMP
- [433] JUMPDEST
- [434] PUSH1 0x20
- [435] DUP2
- [436] MSTORE
- [437] PUSH1 0x00
- [438] DUP3
- [439] MLOAD
- [440] DUP1
- [441] PUSH1 0x20
- [442] DUP5
- [443] ADD
- [444] MSTORE
- [445] PUSH2 0x02b5
- [446] DUP2
- [447] PUSH1 0x40
- [448] DUP6
- [449] ADD
- [450] PUSH1 0x20
- [451] DUP8
- [452] ADD
- [453] PUSH2 0x0256
- [454] JUMP
- [455] JUMPDEST
- [456] PUSH1 0x1f
- [457] ADD
- [458] PUSH1 0x1f
- [459] NOT
- [460] AND
- [461] SWAP2
- [462] SWAP1
- [463] SWAP2
- [464] ADD
- [465] PUSH1 0x40
- [466] ADD
- [467] SWAP3
- [468] SWAP2
- [469] POP
- [470] POP
- [471] JUMP
- [472] 'fe'(Unknown Opcode)
- [473] COINBASE
- [474] PUSH5 0x6472657373
- [475] GASPRICE
- [476] SHA3
- [477] PUSH13 0x6f772d6c6576656c2064656c65
- [478] PUSH8 0x6174652063616c6c
- [479] SHA3
- [480] PUSH7 0x61696c6564a264
- [481] PUSH10 0x70667358221220757d95
- [482] CLZ
- [483] BLOBHASH
- [484] SHL
- [485] SHR
- [486] '0e'(Unknown Opcode)
- [487] '4d'(Unknown Opcode)
- [488] LOG0
- [489] SUB
- [490] RETURN
- [491] PUSH5 0x98bf0b74ac
- [492] CALLDATALOAD
- [493] SWAP2
- [494] 'fb'(Unknown Opcode)
- [495] '22'(Unknown Opcode)
- [496] 'ef'(Unknown Opcode)
- [497] 'e9'(Unknown Opcode)
- [498] CODESIZE
- [499] SLT
- [500] 'e5'(Unknown Opcode)