Mumbai Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [1] PUSH1 0x80
  • [3] PUSH1 0x40
  • [4] MSTORE
  • [5] CALLDATASIZE
  • [7] PUSH1 0x10
  • [8] JUMPI
  • [10] PUSH1 0x0e
  • [12] PUSH1 0x13
  • [13] JUMP
  • [14] JUMPDEST
  • [15] STOP
  • [16] JUMPDEST
  • [18] PUSH1 0x0e
  • [19] JUMPDEST
  • [21] PUSH1 0x1f
  • [23] PUSH1 0x1b
  • [25] PUSH1 0x24
  • [26] JUMP
  • [27] JUMPDEST
  • [29] PUSH1 0x3b
  • [30] JUMP
  • [31] JUMPDEST
  • [32] JUMP
  • [33] JUMPDEST
  • [34] SWAP1
  • [35] JUMP
  • [36] JUMPDEST
  • [38] PUSH1 0x00
  • [40] PUSH1 0x2c
  • [42] PUSH1 0x5e
  • [43] JUMP
  • [44] JUMPDEST
  • [45] SLOAD
  • [47] PUSH1 0x01
  • [49] PUSH1 0x01
  • [51] PUSH1 0xa0
  • [52] SHL
  • [53] SUB
  • [54] AND
  • [55] SWAP2
  • [56] SWAP1
  • [57] POP
  • [58] JUMP
  • [59] JUMPDEST
  • [60] CALLDATASIZE
  • [62] PUSH1 0x00
  • [63] DUP1
  • [64] CALLDATACOPY
  • [66] PUSH1 0x00
  • [67] DUP1
  • [68] CALLDATASIZE
  • [70] PUSH1 0x00
  • [71] DUP5
  • [72] GAS
  • [73] DELEGATECALL
  • [74] RETURNDATASIZE
  • [76] PUSH1 0x00
  • [77] DUP1
  • [78] RETURNDATACOPY
  • [79] DUP1
  • [80] DUP1
  • [81] ISZERO
  • [83] PUSH1 0x59
  • [84] JUMPI
  • [85] RETURNDATASIZE
  • [87] PUSH1 0x00
  • [88] RETURN
  • [89] JUMPDEST
  • [90] RETURNDATASIZE
  • [92] PUSH1 0x00
  • [93] REVERT
  • [94] JUMPDEST
  • [96] PUSH1 0x00
  • [98] PUSH1 0x8b
  • [100] PUSH1 0x21
  • [102] PUSH1 0x01
  • [135] PUSH32 0x797d7c7d0df25d67e029b044c5bcb2b89d68f6483382b5f85e64485950ed88d1
  • [137] PUSH1 0x90
  • [138] JUMP
  • [139] JUMPDEST
  • [140] SWAP1
  • [141] POP
  • [142] SWAP1
  • [143] JUMP
  • [144] JUMPDEST
  • [146] PUSH1 0x00
  • [147] DUP3
  • [148] DUP3
  • [149] LT
  • [150] ISZERO
  • [152] PUSH1 0xaf
  • [153] JUMPI
  • [158] PUSH4 0x4e487b71
  • [160] PUSH1 0xe0
  • [161] SHL
  • [163] PUSH1 0x00
  • [164] MSTORE
  • [166] PUSH1 0x11
  • [168] PUSH1 0x04
  • [169] MSTORE
  • [171] PUSH1 0x24
  • [173] PUSH1 0x00
  • [174] REVERT
  • [175] JUMPDEST
  • [176] POP
  • [177] SUB
  • [178] SWAP1
  • [179] JUMP
  • [180] 'fe'(Unknown Opcode)
  • [181] LOG2
  • [187] PUSH5 0x6970667358
  • [188] '22'(Unknown Opcode)
  • [189] SLT
  • [190] SHA3
  • [191] CREATE
  • [192] DUP14
  • [193] CALLDATALOAD
  • [208] PUSH14 0xdaec1bf4227204a9ae1c306f69dc
  • [227] PUSH18 0x0a649ffc891fc4f2a584685ae164736f6c63
  • [228] NUMBER
  • [229] STOP
  • [230] ADDMOD
  • [231] '0c'(Unknown Opcode)
  • [232] STOP
  • [233] CALLER