Built by Functori

Debug EVM transactions
with surgical precision

Apollo traces EVM execution step by step to uncover edge cases, gas inefficiencies, and unexpected opcode behavior.

Launch Apollo Explore features
42 PUSH1 0x60
44 PUSH1 0x40
46 MSTORE // memory[0x40] = 0x60
47 CALLVALUE // ← you are here
48 DUP1
49 ISZERO
50 PUSH2 0x0057
53 JUMPI // branch if no ETH sent

Everything you need to understand EVM execution

A complete debugger built for developers, auditors, and security researchers working with Ethereum smart contracts.

Step-by-step execution

Navigate forward and backward through every opcode. Auto-play with adjustable speed, or jump to specific instructions.

Stack, Memory & Storage

Inspect every layer of EVM state in real time. See which values are pushed, popped, and how storage slots evolve.

Advanced breakpoints

Set breakpoints on opcodes, program counters, storage slots, memory ranges, or transient storage changes. Stop exactly where it matters.

Gas profiling

Track gas consumption per instruction and per contract. Identify bottlenecks and optimize your smart contract execution costs.

Contract viewer

View decoded bytecode with highlighted execution, visit counters, and automatic tracking of cross-contract calls.

Filters & aliases

Filter opcodes, skip contracts, and label addresses with aliases. Customize the debugger to focus on what you care about.

From transaction hash to full understanding

Three steps to debug any EVM transaction on any network.

1

Enter a transaction hash

Paste a transaction hash and the RPC URL of any EVM-compatible node. Apollo fetches the full execution trace.

2

Explore the execution

Step through opcodes one by one. Inspect the stack, memory, and storage at every point. Set breakpoints to jump to key moments.

3

Understand & optimize

Identify gas inefficiencies, trace unexpected behaviors, and debug reverts. Export your findings and fix your contracts.

Built for the people who need it most

🛠

Smart contract developers

Debug failing transactions and understand exactly why a REVERT happened, what storage changed, and where gas is spent.

🕵

Security researchers

Analyze exploit transactions opcode by opcode. Trace cross-contract calls, delegatecalls, and reentrancy patterns.

📋

Auditors

Verify contract behavior against specifications. Step through edge cases and validate that invariants hold.

🎓

Students & educators

Learn EVM internals by watching real transactions execute. See how Solidity compiles to opcodes and how the stack machine works.

Ready to trace your first transaction?

Apollo is free to use. Load a transaction hash and start debugging in seconds.

Launch Apollo