3v4l.org

run code in 300+ PHP versions simultaneously
<?php $json = ' { "profiles": { "llaurenss": { "name": "llaurenss" } }, "selectedProfile": "llaurenss", "clientToken": "31a5d808-c487-47b2-b85a-ce535d68b48b", "authenticationDatabase": { "3ea975d90add4270af3b1adef9b3b975": { "displayName": "llaurenss", "accessToken": "ae0b09da6979439587b41e45353f2b9d", "userid": "04c83cc8174e1846ae96f577a21c07c3", "uuid": "3ea975d9-0add-4270-af3b-1adef9b3b975", "username": "henkionline@gmail.com" } }, "selectedUser": "3ea975d90add4270af3b1adef9b3b975", "launcherVersion": { "name": "1.6.61", "format": 18 } }'; $myArray = json_decode($json, true); echo $myArray['authenticationDatabase']['3ea975d90add4270af3b1adef9b3b975']['displayName']; echo ':'; echo $myArray['authenticationDatabase']['3ea975d90add4270af3b1adef9b3b975']['uuid']; echo ':'; echo $myArray['authenticationDatabase']['3ea975d90add4270af3b1adef9b3b975']['accessToken']; echo ':'; echo $myArray['clientToken']; ?>
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/BJOBf
function name:  (null)
number of ops:  24
compiled vars:  !0 = $json, !1 = $myArray
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, '%0A%7B%0A++%22profiles%22%3A+%7B%0A++++%22llaurenss%22%3A+%7B%0A++++++%22name%22%3A+%22llaurenss%22%0A++++%7D%0A++%7D%2C%0A++%22selectedProfile%22%3A+%22llaurenss%22%2C%0A++%22clientToken%22%3A+%2231a5d808-c487-47b2-b85a-ce535d68b48b%22%2C%0A++%22authenticationDatabase%22%3A+%7B%0A++++%223ea975d90add4270af3b1adef9b3b975%22%3A+%7B%0A++++++%22displayName%22%3A+%22llaurenss%22%2C%0A++++++%22accessToken%22%3A+%22ae0b09da6979439587b41e45353f2b9d%22%2C%0A++++++%22userid%22%3A+%2204c83cc8174e1846ae96f577a21c07c3%22%2C%0A++++++%22uuid%22%3A+%223ea975d9-0add-4270-af3b-1adef9b3b975%22%2C%0A++++++%22username%22%3A+%22henkionline%40gmail.com%22%0A++++%7D%0A++%7D%2C%0A++%22selectedUser%22%3A+%223ea975d90add4270af3b1adef9b3b975%22%2C%0A++%22launcherVersion%22%3A+%7B%0A++++%22name%22%3A+%221.6.61%22%2C%0A++++%22format%22%3A+18%0A++%7D%0A%7D'
   27     1        INIT_FCALL                                               'json_decode'
          2        SEND_VAR                                                 !0
          3        SEND_VAL                                                 <true>
          4        DO_ICALL                                         $3      
          5        ASSIGN                                                   !1, $3
   28     6        FETCH_DIM_R                                      ~5      !1, 'authenticationDatabase'
          7        FETCH_DIM_R                                      ~6      ~5, '3ea975d90add4270af3b1adef9b3b975'
          8        FETCH_DIM_R                                      ~7      ~6, 'displayName'
          9        ECHO                                                     ~7
   29    10        ECHO                                                     '%3A'
   30    11        FETCH_DIM_R                                      ~8      !1, 'authenticationDatabase'
         12        FETCH_DIM_R                                      ~9      ~8, '3ea975d90add4270af3b1adef9b3b975'
         13        FETCH_DIM_R                                      ~10     ~9, 'uuid'
         14        ECHO                                                     ~10
   31    15        ECHO                                                     '%3A'
   32    16        FETCH_DIM_R                                      ~11     !1, 'authenticationDatabase'
         17        FETCH_DIM_R                                      ~12     ~11, '3ea975d90add4270af3b1adef9b3b975'
         18        FETCH_DIM_R                                      ~13     ~12, 'accessToken'
         19        ECHO                                                     ~13
   33    20        ECHO                                                     '%3A'
   34    21        FETCH_DIM_R                                      ~14     !1, 'clientToken'
         22        ECHO                                                     ~14
   35    23      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
157.53 ms | 1396 KiB | 15 Q