Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [1] PUSH1 0x80
- [3] PUSH1 0x40
- [4] MSTORE
- [6] PUSH1 0x04
- [7] CALLDATASIZE
- [8] LT
- [11] PUSH2 0x0022
- [12] JUMPI
- [14] PUSH1 0x00
- [15] CALLDATALOAD
- [17] PUSH1 0xe0
- [18] SHR
- [19] DUP1
- [24] PUSH4 0x4a0687ef
- [25] EQ
- [28] PUSH2 0x0039
- [29] JUMPI
- [32] PUSH2 0x0031
- [33] JUMP
- [34] JUMPDEST
- [35] CALLDATASIZE
- [38] PUSH2 0x0031
- [39] JUMPI
- [42] PUSH2 0x002f
- [45] PUSH2 0x006c
- [46] JUMP
- [47] JUMPDEST
- [48] STOP
- [49] JUMPDEST
- [52] PUSH2 0x002f
- [55] PUSH2 0x006c
- [56] JUMP
- [57] JUMPDEST
- [58] CALLVALUE
- [59] DUP1
- [60] ISZERO
- [63] PUSH2 0x0045
- [64] JUMPI
- [66] PUSH1 0x00
- [67] DUP1
- [68] REVERT
- [69] JUMPDEST
- [70] POP
- [73] PUSH2 0x002f
- [75] PUSH1 0x04
- [76] DUP1
- [77] CALLDATASIZE
- [78] SUB
- [80] PUSH1 0x20
- [81] DUP2
- [82] LT
- [83] ISZERO
- [86] PUSH2 0x005c
- [87] JUMPI
- [89] PUSH1 0x00
- [90] DUP1
- [91] REVERT
- [92] JUMPDEST
- [93] POP
- [94] CALLDATALOAD
- [96] PUSH1 0x01
- [98] PUSH1 0x01
- [100] PUSH1 0xa0
- [101] SHL
- [102] SUB
- [103] AND
- [106] PUSH2 0x0086
- [107] JUMP
- [108] JUMPDEST
- [111] PUSH2 0x0074
- [114] PUSH2 0x0084
- [115] JUMP
- [116] JUMPDEST
- [119] PUSH2 0x0084
- [122] PUSH2 0x007f
- [125] PUSH2 0x0152
- [126] JUMP
- [127] JUMPDEST
- [130] PUSH2 0x0161
- [131] JUMP
- [132] JUMPDEST
- [133] JUMP
- [134] JUMPDEST
- [136] PUSH1 0x01
- [138] PUSH1 0x01
- [140] PUSH1 0xa0
- [141] SHL
- [142] SUB
- [143] DUP2
- [144] AND
- [147] PUSH2 0x00e1
- [148] JUMPI
- [150] PUSH1 0x40
- [151] DUP1
- [152] MLOAD
- [156] PUSH3 0x461bcd
- [158] PUSH1 0xe5
- [159] SHL
- [160] DUP2
- [161] MSTORE
- [163] PUSH1 0x20
- [165] PUSH1 0x04
- [166] DUP3
- [167] ADD
- [168] MSTORE
- [170] PUSH1 0x17
- [172] PUSH1 0x24
- [173] DUP3
- [174] ADD
- [175] MSTORE
- [208] PUSH32 0x5555505350726f78793a207a65726f2061646472657373000000000000000000
- [210] PUSH1 0x44
- [211] DUP3
- [212] ADD
- [213] MSTORE
- [214] SWAP1
- [215] MLOAD
- [216] SWAP1
- [217] DUP2
- [218] SWAP1
- [219] SUB
- [221] PUSH1 0x64
- [222] ADD
- [223] SWAP1
- [224] REVERT
- [225] JUMPDEST
- [227] PUSH1 0x00
- [230] PUSH2 0x00eb
- [233] PUSH2 0x0185
- [234] JUMP
- [235] JUMPDEST
- [237] PUSH1 0x01
- [239] PUSH1 0x01
- [241] PUSH1 0xa0
- [242] SHL
- [243] SUB
- [244] AND
- [245] EQ
- [248] PUSH2 0x0146
- [249] JUMPI
- [251] PUSH1 0x40
- [252] DUP1
- [253] MLOAD
- [257] PUSH3 0x461bcd
- [259] PUSH1 0xe5
- [260] SHL
- [261] DUP2
- [262] MSTORE
- [264] PUSH1 0x20
- [266] PUSH1 0x04
- [267] DUP3
- [268] ADD
- [269] MSTORE
- [271] PUSH1 0x1e
- [273] PUSH1 0x24
- [274] DUP3
- [275] ADD
- [276] MSTORE
- [309] PUSH32 0x5555505350726f78793a20616c726561647920696e697469616c697a65640000
- [311] PUSH1 0x44
- [312] DUP3
- [313] ADD
- [314] MSTORE
- [315] SWAP1
- [316] MLOAD
- [317] SWAP1
- [318] DUP2
- [319] SWAP1
- [320] SUB
- [322] PUSH1 0x64
- [323] ADD
- [324] SWAP1
- [325] REVERT
- [326] JUMPDEST
- [329] PUSH2 0x014f
- [330] DUP2
- [333] PUSH2 0x01aa
- [334] JUMP
- [335] JUMPDEST
- [336] POP
- [337] JUMP
- [338] JUMPDEST
- [340] PUSH1 0x00
- [343] PUSH2 0x015c
- [346] PUSH2 0x0185
- [347] JUMP
- [348] JUMPDEST
- [349] SWAP1
- [350] POP
- [351] SWAP1
- [352] JUMP
- [353] JUMPDEST
- [354] CALLDATASIZE
- [356] PUSH1 0x00
- [357] DUP1
- [358] CALLDATACOPY
- [360] PUSH1 0x00
- [361] DUP1
- [362] CALLDATASIZE
- [364] PUSH1 0x00
- [365] DUP5
- [366] GAS
- [367] DELEGATECALL
- [368] RETURNDATASIZE
- [370] PUSH1 0x00
- [371] DUP1
- [372] RETURNDATACOPY
- [373] DUP1
- [374] DUP1
- [375] ISZERO
- [378] PUSH2 0x0180
- [379] JUMPI
- [380] RETURNDATASIZE
- [382] PUSH1 0x00
- [383] RETURN
- [384] JUMPDEST
- [385] RETURNDATASIZE
- [387] PUSH1 0x00
- [388] REVERT
- [389] JUMPDEST
- [422] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
- [423] SLOAD
- [424] SWAP1
- [425] JUMP
- [426] JUMPDEST
- [459] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
- [460] SSTORE
- [461] JUMP
- [462] 'fe'(Unknown Opcode)
- [463] LOG2
- [469] PUSH5 0x6970667358
- [470] '22'(Unknown Opcode)
- [471] SLT
- [472] SHA3
- [505] PUSH32 0x4d1aae539b5f520670399a5049006d749c4642873ece0ea4ae53a8f7a0f8a564