3v4l.org

run code in 300+ PHP versions simultaneously
<?php $string = urlencode('защита данных.html'); var_dump($string); $string = urldecode($string); var_dump($string);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/e4ZrS
function name:  (null)
number of ops:  15
compiled vars:  !0 = $string
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   INIT_FCALL                                               'urlencode'
          1        SEND_VAL                                                 '%D0%B7%D0%B0%D1%89%D0%B8%D1%82%D0%B0+%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D1%85.html'
          2        DO_ICALL                                         $1      
          3        ASSIGN                                                   !0, $1
    5     4        INIT_FCALL                                               'var_dump'
          5        SEND_VAR                                                 !0
          6        DO_ICALL                                                 
    7     7        INIT_FCALL                                               'urldecode'
          8        SEND_VAR                                                 !0
          9        DO_ICALL                                         $4      
         10        ASSIGN                                                   !0, $4
    9    11        INIT_FCALL                                               'var_dump'
         12        SEND_VAR                                                 !0
         13        DO_ICALL                                                 
         14      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
159.86 ms | 1394 KiB | 19 Q