3v4l.org

run code in 300+ PHP versions simultaneously
<?php $qq = mysql_escape_string(serialize(array("aaa", "bbbb"))); var_dump($qq);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/N5D2N
function name:  (null)
number of ops:  11
compiled vars:  !0 = $qq
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   INIT_FCALL_BY_NAME                                       'mysql_escape_string'
          1        INIT_FCALL                                               'serialize'
          2        SEND_VAL                                                 <array>
          3        DO_ICALL                                         $1      
          4        SEND_VAR_NO_REF_EX                                       $1
          5        DO_FCALL                                      0  $2      
          6        ASSIGN                                                   !0, $2
    3     7        INIT_FCALL                                               'var_dump'
          8        SEND_VAR                                                 !0
          9        DO_ICALL                                                 
         10      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
161.88 ms | 1394 KiB | 17 Q