3v4l.org

run code in 300+ PHP versions simultaneously
<?php unserialize('a:88888888888884444444444853:{s:2:"as"?R:1;');
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/idsaY
function name:  (null)
number of ops:  4
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   INIT_FCALL                                               'unserialize'
          1        SEND_VAL                                                 'a%3A88888888888884444444444853%3A%7Bs%3A2%3A%22as%22%3FR%3A1%3B'
          2        DO_ICALL                                                 
          3      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
233.37 ms | 1398 KiB | 15 Q