Bytecode Analysis
Parse and analyze EVM bytecode without executing it. Extract ABIs from unverified contracts, detect patterns, and debug at the opcode level.Extract ABI from Bytecode
Recover function selectors and events from any deployed contract—even without source code:Parse Instructions
Disassemble bytecode into individual opcodes:Pretty Print
Human-readable bytecode disassembly:Analyze Jump Destinations
Find all valid jump targets for control flow analysis:Gas Analysis
Estimate gas costs per instruction:Stack Analysis
Analyze stack depth and effects:Strip Metadata
Remove Solidity compiler metadata for cleaner analysis:Hash Bytecode
Compute keccak256 hash (useful for CREATE2 address prediction):EVM Execution
Execute bytecode directly in TypeScript. Build execution frames, manipulate the stack, and run opcodes.Create Execution Frames
Execute Opcodes
Run individual opcodes with full gas accounting:Stack Operations
Direct stack manipulation:Memory Operations
Read and write EVM memory:Gas Accounting
Track gas consumption:Full Opcode Categories
All EVM opcodes are implemented:Bytecode Documentation
Complete bytecode analysis API reference

