Tools
Bytecode to Opcode Disassembler
Attempts to decode the low level Contract Bytecodes to Opcodes.
Decoded Bytecode:
- [1] PUSH1 0x80
- [3] PUSH1 0x40
- [4] MSTORE
- [5] CALLDATASIZE
- [8] PUSH2 0x0013
- [9] JUMPI
- [12] PUSH2 0x0011
- [15] PUSH2 0x0017
- [16] JUMP
- [17] JUMPDEST
- [18] STOP
- [19] JUMPDEST
- [22] PUSH2 0x0011
- [23] JUMPDEST
- [26] PUSH2 0x0027
- [29] PUSH2 0x0022
- [32] PUSH2 0x005e
- [33] JUMP
- [34] JUMPDEST
- [37] PUSH2 0x0096
- [38] JUMP
- [39] JUMPDEST
- [40] JUMP
- [41] JUMPDEST
- [43] PUSH1 0x60
- [46] PUSH2 0x004e
- [47] DUP4
- [48] DUP4
- [50] PUSH1 0x40
- [51] MLOAD
- [52] DUP1
- [54] PUSH1 0x60
- [55] ADD
- [57] PUSH1 0x40
- [58] MSTORE
- [59] DUP1
- [61] PUSH1 0x27
- [62] DUP2
- [63] MSTORE
- [65] PUSH1 0x20
- [66] ADD
- [69] PUSH2 0x024c
- [71] PUSH1 0x27
- [72] SWAP2
- [73] CODECOPY
- [76] PUSH2 0x00ba
- [77] JUMP
- [78] JUMPDEST
- [79] SWAP4
- [80] SWAP3
- [81] POP
- [82] POP
- [83] POP
- [84] JUMP
- [85] JUMPDEST
- [86] EXTCODESIZE
- [87] ISZERO
- [88] ISZERO
- [89] SWAP1
- [90] JUMP
- [91] JUMPDEST
- [92] SWAP1
- [93] JUMP
- [94] JUMPDEST
- [96] PUSH1 0x00
- [99] PUSH2 0x0091
- [132] PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
- [133] SLOAD
- [135] PUSH1 0x01
- [137] PUSH1 0x01
- [139] PUSH1 0xa0
- [140] SHL
- [141] SUB
- [142] AND
- [143] SWAP1
- [144] JUMP
- [145] JUMPDEST
- [146] SWAP1
- [147] POP
- [148] SWAP1
- [149] JUMP
- [150] JUMPDEST
- [151] CALLDATASIZE
- [153] PUSH1 0x00
- [154] DUP1
- [155] CALLDATACOPY
- [157] PUSH1 0x00
- [158] DUP1
- [159] CALLDATASIZE
- [161] PUSH1 0x00
- [162] DUP5
- [163] GAS
- [164] DELEGATECALL
- [165] RETURNDATASIZE
- [167] PUSH1 0x00
- [168] DUP1
- [169] RETURNDATACOPY
- [170] DUP1
- [171] DUP1
- [172] ISZERO
- [175] PUSH2 0x00b5
- [176] JUMPI
- [177] RETURNDATASIZE
- [179] PUSH1 0x00
- [180] RETURN
- [181] JUMPDEST
- [182] RETURNDATASIZE
- [184] PUSH1 0x00
- [185] REVERT
- [186] JUMPDEST
- [188] PUSH1 0x60
- [189] DUP4
- [190] EXTCODESIZE
- [193] PUSH2 0x011e
- [194] JUMPI
- [196] PUSH1 0x40
- [197] MLOAD
- [201] PUSH3 0x461bcd
- [203] PUSH1 0xe5
- [204] SHL
- [205] DUP2
- [206] MSTORE
- [208] PUSH1 0x20
- [210] PUSH1 0x04
- [211] DUP3
- [212] ADD
- [213] MSTORE
- [215] PUSH1 0x26
- [217] PUSH1 0x24
- [218] DUP3
- [219] ADD
- [220] MSTORE
- [253] PUSH32 0x416464726573733a2064656c65676174652063616c6c20746f206e6f6e2d636f
- [255] PUSH1 0x44
- [256] DUP3
- [257] ADD
- [258] MSTORE
- [265] PUSH6 0x1b9d1c9858dd
- [267] PUSH1 0xd2
- [268] SHL
- [270] PUSH1 0x64
- [271] DUP3
- [272] ADD
- [273] MSTORE
- [275] PUSH1 0x84
- [276] ADD
- [277] JUMPDEST
- [279] PUSH1 0x40
- [280] MLOAD
- [281] DUP1
- [282] SWAP2
- [283] SUB
- [284] SWAP1
- [285] REVERT
- [286] JUMPDEST
- [288] PUSH1 0x00
- [289] DUP1
- [290] DUP6
- [292] PUSH1 0x01
- [294] PUSH1 0x01
- [296] PUSH1 0xa0
- [297] SHL
- [298] SUB
- [299] AND
- [300] DUP6
- [302] PUSH1 0x40
- [303] MLOAD
- [306] PUSH2 0x0139
- [307] SWAP2
- [308] SWAP1
- [311] PUSH2 0x01cc
- [312] JUMP
- [313] JUMPDEST
- [315] PUSH1 0x00
- [317] PUSH1 0x40
- [318] MLOAD
- [319] DUP1
- [320] DUP4
- [321] SUB
- [322] DUP2
- [323] DUP6
- [324] GAS
- [325] DELEGATECALL
- [326] SWAP2
- [327] POP
- [328] POP
- [329] RETURNDATASIZE
- [330] DUP1
- [332] PUSH1 0x00
- [333] DUP2
- [334] EQ
- [337] PUSH2 0x0174
- [338] JUMPI
- [340] PUSH1 0x40
- [341] MLOAD
- [342] SWAP2
- [343] POP
- [345] PUSH1 0x1f
- [346] NOT
- [348] PUSH1 0x3f
- [349] RETURNDATASIZE
- [350] ADD
- [351] AND
- [352] DUP3
- [353] ADD
- [355] PUSH1 0x40
- [356] MSTORE
- [357] RETURNDATASIZE
- [358] DUP3
- [359] MSTORE
- [360] RETURNDATASIZE
- [362] PUSH1 0x00
- [364] PUSH1 0x20
- [365] DUP5
- [366] ADD
- [367] RETURNDATACOPY
- [370] PUSH2 0x0179
- [371] JUMP
- [372] JUMPDEST
- [374] PUSH1 0x60
- [375] SWAP2
- [376] POP
- [377] JUMPDEST
- [378] POP
- [379] SWAP2
- [380] POP
- [381] SWAP2
- [382] POP
- [385] PUSH2 0x0189
- [386] DUP3
- [387] DUP3
- [388] DUP7
- [391] PUSH2 0x0193
- [392] JUMP
- [393] JUMPDEST
- [394] SWAP7
- [395] SWAP6
- [396] POP
- [397] POP
- [398] POP
- [399] POP
- [400] POP
- [401] POP
- [402] JUMP
- [403] JUMPDEST
- [405] PUSH1 0x60
- [406] DUP4
- [407] ISZERO
- [410] PUSH2 0x01a2
- [411] JUMPI
- [412] POP
- [413] DUP2
- [416] PUSH2 0x004e
- [417] JUMP
- [418] JUMPDEST
- [419] DUP3
- [420] MLOAD
- [421] ISZERO
- [424] PUSH2 0x01b2
- [425] JUMPI
- [426] DUP3
- [427] MLOAD
- [428] DUP1
- [429] DUP5
- [431] PUSH1 0x20
- [432] ADD
- [433] REVERT
- [434] JUMPDEST
- [435] DUP2
- [437] PUSH1 0x40
- [438] MLOAD
- [442] PUSH3 0x461bcd
- [444] PUSH1 0xe5
- [445] SHL
- [446] DUP2
- [447] MSTORE
- [449] PUSH1 0x04
- [450] ADD
- [453] PUSH2 0x0115
- [454] SWAP2
- [455] SWAP1
- [458] PUSH2 0x01e8
- [459] JUMP
- [460] JUMPDEST
- [462] PUSH1 0x00
- [463] DUP3
- [464] MLOAD
- [467] PUSH2 0x01de
- [468] DUP2
- [469] DUP5
- [471] PUSH1 0x20
- [472] DUP8
- [473] ADD
- [476] PUSH2 0x021b
- [477] JUMP
- [478] JUMPDEST
- [479] SWAP2
- [480] SWAP1
- [481] SWAP2
- [482] ADD
- [483] SWAP3
- [484] SWAP2
- [485] POP
- [486] POP
- [487] JUMP
- [488] JUMPDEST
- [490] PUSH1 0x00
- [492] PUSH1 0x20
- [493] DUP3
- [494] MSTORE
- [495] DUP3
- [496] MLOAD
- [497] DUP1
- [499] PUSH1 0x20
- [500] DUP5
- [501] ADD
- [502] MSTORE
- [505] PUSH2 0x0207
- [506] DUP2
- [508] PUSH1 0x40
- [509] DUP6
- [510] ADD
- [512] PUSH1 0x20
- [513] DUP8
- [514] ADD
- [517] PUSH2 0x021b
- [518] JUMP
- [519] JUMPDEST
- [521] PUSH1 0x1f
- [522] ADD
- [524] PUSH1 0x1f
- [525] NOT
- [526] AND
- [527] SWAP2
- [528] SWAP1
- [529] SWAP2
- [530] ADD
- [532] PUSH1 0x40
- [533] ADD
- [534] SWAP3
- [535] SWAP2
- [536] POP
- [537] POP
- [538] JUMP
- [539] JUMPDEST
- [541] PUSH1 0x00
- [542] JUMPDEST
- [543] DUP4
- [544] DUP2
- [545] LT
- [546] ISZERO
- [549] PUSH2 0x0236
- [550] JUMPI
- [551] DUP2
- [552] DUP2
- [553] ADD
- [554] MLOAD
- [555] DUP4
- [556] DUP3
- [557] ADD
- [558] MSTORE
- [560] PUSH1 0x20
- [561] ADD
- [564] PUSH2 0x021e
- [565] JUMP
- [566] JUMPDEST
- [567] DUP4
- [568] DUP2
- [569] GT
- [570] ISZERO
- [573] PUSH2 0x0245
- [574] JUMPI
- [576] PUSH1 0x00
- [577] DUP5
- [578] DUP5
- [579] ADD
- [580] MSTORE
- [581] JUMPDEST
- [582] POP
- [583] POP
- [584] POP
- [585] POP
- [586] JUMP
- [587] 'fe'(Unknown Opcode)
- [588] COINBASE
- [594] PUSH5 0x6472657373
- [595] GASPRICE
- [596] SHA3
- [610] PUSH13 0x6f772d6c6576656c2064656c65
- [619] PUSH8 0x6174652063616c6c
- [620] SHA3
- [628] PUSH7 0x61696c6564a264
- [639] PUSH10 0x706673582212209b8470
- [640] CREATE
- [656] PUSH15 0x8a3960c912103fc2be177edaad6958
- [657] '4e'(Unknown Opcode)
- [658] 'e3'(Unknown Opcode)
- [659] 'c7'(Unknown Opcode)
- [660] 'd2'(Unknown Opcode)
- [661] DUP1
- [662] SWAP15
- [663] 'e7'(Unknown Opcode)
- [664] CALLDATACOPY
- [665] 'e7'(Unknown Opcode)
- [666] SWAP5
- [667] ADDMOD
- [668] 'e7'(Unknown Opcode)
- [674] PUSH5 0x736f6c6343
- [675] STOP
- [676] ADDMOD
- [677] MUL
- [678] STOP
- [679] CALLER