Mumbai Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [1] PUSH1 0x80
  • [3] PUSH1 0x40
  • [4] MSTORE
  • [6] PUSH1 0x04
  • [7] CALLDATASIZE
  • [8] LT
  • [11] PUSH2 0x0022
  • [12] JUMPI
  • [14] PUSH1 0x00
  • [15] CALLDATALOAD
  • [17] PUSH1 0xe0
  • [18] SHR
  • [19] DUP1
  • [24] PUSH4 0x4a0687ef
  • [25] EQ
  • [28] PUSH2 0x0039
  • [29] JUMPI
  • [32] PUSH2 0x0031
  • [33] JUMP
  • [34] JUMPDEST
  • [35] CALLDATASIZE
  • [38] PUSH2 0x0031
  • [39] JUMPI
  • [42] PUSH2 0x002f
  • [45] PUSH2 0x006c
  • [46] JUMP
  • [47] JUMPDEST
  • [48] STOP
  • [49] JUMPDEST
  • [52] PUSH2 0x002f
  • [55] PUSH2 0x006c
  • [56] JUMP
  • [57] JUMPDEST
  • [58] CALLVALUE
  • [59] DUP1
  • [60] ISZERO
  • [63] PUSH2 0x0045
  • [64] JUMPI
  • [66] PUSH1 0x00
  • [67] DUP1
  • [68] REVERT
  • [69] JUMPDEST
  • [70] POP
  • [73] PUSH2 0x002f
  • [75] PUSH1 0x04
  • [76] DUP1
  • [77] CALLDATASIZE
  • [78] SUB
  • [80] PUSH1 0x20
  • [81] DUP2
  • [82] LT
  • [83] ISZERO
  • [86] PUSH2 0x005c
  • [87] JUMPI
  • [89] PUSH1 0x00
  • [90] DUP1
  • [91] REVERT
  • [92] JUMPDEST
  • [93] POP
  • [94] CALLDATALOAD
  • [96] PUSH1 0x01
  • [98] PUSH1 0x01
  • [100] PUSH1 0xa0
  • [101] SHL
  • [102] SUB
  • [103] AND
  • [106] PUSH2 0x0086
  • [107] JUMP
  • [108] JUMPDEST
  • [111] PUSH2 0x0074
  • [114] PUSH2 0x0084
  • [115] JUMP
  • [116] JUMPDEST
  • [119] PUSH2 0x0084
  • [122] PUSH2 0x007f
  • [125] PUSH2 0x0152
  • [126] JUMP
  • [127] JUMPDEST
  • [130] PUSH2 0x0161
  • [131] JUMP
  • [132] JUMPDEST
  • [133] JUMP
  • [134] JUMPDEST
  • [136] PUSH1 0x01
  • [138] PUSH1 0x01
  • [140] PUSH1 0xa0
  • [141] SHL
  • [142] SUB
  • [143] DUP2
  • [144] AND
  • [147] PUSH2 0x00e1
  • [148] JUMPI
  • [150] PUSH1 0x40
  • [151] DUP1
  • [152] MLOAD
  • [156] PUSH3 0x461bcd
  • [158] PUSH1 0xe5
  • [159] SHL
  • [160] DUP2
  • [161] MSTORE
  • [163] PUSH1 0x20
  • [165] PUSH1 0x04
  • [166] DUP3
  • [167] ADD
  • [168] MSTORE
  • [170] PUSH1 0x17
  • [172] PUSH1 0x24
  • [173] DUP3
  • [174] ADD
  • [175] MSTORE
  • [208] PUSH32 0x5555505350726f78793a207a65726f2061646472657373000000000000000000
  • [210] PUSH1 0x44
  • [211] DUP3
  • [212] ADD
  • [213] MSTORE
  • [214] SWAP1
  • [215] MLOAD
  • [216] SWAP1
  • [217] DUP2
  • [218] SWAP1
  • [219] SUB
  • [221] PUSH1 0x64
  • [222] ADD
  • [223] SWAP1
  • [224] REVERT
  • [225] JUMPDEST
  • [227] PUSH1 0x00
  • [230] PUSH2 0x00eb
  • [233] PUSH2 0x0185
  • [234] JUMP
  • [235] JUMPDEST
  • [237] PUSH1 0x01
  • [239] PUSH1 0x01
  • [241] PUSH1 0xa0
  • [242] SHL
  • [243] SUB
  • [244] AND
  • [245] EQ
  • [248] PUSH2 0x0146
  • [249] JUMPI
  • [251] PUSH1 0x40
  • [252] DUP1
  • [253] MLOAD
  • [257] PUSH3 0x461bcd
  • [259] PUSH1 0xe5
  • [260] SHL
  • [261] DUP2
  • [262] MSTORE
  • [264] PUSH1 0x20
  • [266] PUSH1 0x04
  • [267] DUP3
  • [268] ADD
  • [269] MSTORE
  • [271] PUSH1 0x1e
  • [273] PUSH1 0x24
  • [274] DUP3
  • [275] ADD
  • [276] MSTORE
  • [309] PUSH32 0x5555505350726f78793a20616c726561647920696e697469616c697a65640000
  • [311] PUSH1 0x44
  • [312] DUP3
  • [313] ADD
  • [314] MSTORE
  • [315] SWAP1
  • [316] MLOAD
  • [317] SWAP1
  • [318] DUP2
  • [319] SWAP1
  • [320] SUB
  • [322] PUSH1 0x64
  • [323] ADD
  • [324] SWAP1
  • [325] REVERT
  • [326] JUMPDEST
  • [329] PUSH2 0x014f
  • [330] DUP2
  • [333] PUSH2 0x01aa
  • [334] JUMP
  • [335] JUMPDEST
  • [336] POP
  • [337] JUMP
  • [338] JUMPDEST
  • [340] PUSH1 0x00
  • [343] PUSH2 0x015c
  • [346] PUSH2 0x0185
  • [347] JUMP
  • [348] JUMPDEST
  • [349] SWAP1
  • [350] POP
  • [351] SWAP1
  • [352] JUMP
  • [353] JUMPDEST
  • [354] CALLDATASIZE
  • [356] PUSH1 0x00
  • [357] DUP1
  • [358] CALLDATACOPY
  • [360] PUSH1 0x00
  • [361] DUP1
  • [362] CALLDATASIZE
  • [364] PUSH1 0x00
  • [365] DUP5
  • [366] GAS
  • [367] DELEGATECALL
  • [368] RETURNDATASIZE
  • [370] PUSH1 0x00
  • [371] DUP1
  • [372] RETURNDATACOPY
  • [373] DUP1
  • [374] DUP1
  • [375] ISZERO
  • [378] PUSH2 0x0180
  • [379] JUMPI
  • [380] RETURNDATASIZE
  • [382] PUSH1 0x00
  • [383] RETURN
  • [384] JUMPDEST
  • [385] RETURNDATASIZE
  • [387] PUSH1 0x00
  • [388] REVERT
  • [389] JUMPDEST
  • [422] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
  • [423] SLOAD
  • [424] SWAP1
  • [425] JUMP
  • [426] JUMPDEST
  • [459] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
  • [460] SSTORE
  • [461] JUMP
  • [462] 'fe'(Unknown Opcode)
  • [463] LOG2
  • [469] PUSH5 0x6970667358
  • [470] '22'(Unknown Opcode)
  • [471] SLT
  • [472] SHA3
  • [505] PUSH32 0x4d1aae539b5f520670399a5049006d749c4642873ece0ea4ae53a8f7a0f8a564