3v4l.org

run code in 300+ PHP versions simultaneously
<?php function mb_unserialize($string) { $string = preg_replace('!s:(\d+):"(.*?)";!se', "'s:'.strlen('$2').':\"$2\";'", $string); return unserialize($string); } $string = <<<HERE a:1:{i:0;a:15:{s:2:"ID";s:3:"157";s:3:"qty";i:1;s:4:"name";s:21:"?????\?????";s:6:"nameHe";s:21:"?????\?????";s:6:"nameEn";s:21:"?????\?????";s:5:"price";d:80;s:8:"priceNet";d:80;s:10:"priceGross";d:96.7999999999999971578290569595992565155029296875;s:3:"sum";d:80;s:6:"sumNet";d:80;s:8:"sumGross";d:96.7999999999999971578290569595992565155029296875;s:7:"vatRate";d:21;s:3:"vat";d:16.800000000000000710542735760100185871124267578125;s:6:"vatSum";d:16.800000000000000710542735760100185871124267578125;s:4:"hash";s:40:"94d8e389a9617f0adc2cfedb6e0e102155f4ec2f";}} HERE; var_dump(mb_unserialize($string));
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/nZ7rF
function name:  (null)
number of ops:  8
compiled vars:  !0 = $string
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    7     0  E >   ASSIGN                                                   !0, 'a%3A1%3A%7Bi%3A0%3Ba%3A15%3A%7Bs%3A2%3A%22ID%22%3Bs%3A3%3A%22157%22%3Bs%3A3%3A%22qty%22%3Bi%3A1%3Bs%3A4%3A%22name%22%3Bs%3A21%3A%22%3F%3F%3F%3F%3F%5C%3F%3F%3F%3F%3F%22%3Bs%3A6%3A%22nameHe%22%3Bs%3A21%3A%22%3F%3F%3F%3F%3F%5C%3F%3F%3F%3F%3F%22%3Bs%3A6%3A%22nameEn%22%3Bs%3A21%3A%22%3F%3F%3F%3F%3F%5C%3F%3F%3F%3F%3F%22%3Bs%3A5%3A%22price%22%3Bd%3A80%3Bs%3A8%3A%22priceNet%22%3Bd%3A80%3Bs%3A10%3A%22priceGross%22%3Bd%3A96.7999999999999971578290569595992565155029296875%3Bs%3A3%3A%22sum%22%3Bd%3A80%3Bs%3A6%3A%22sumNet%22%3Bd%3A80%3Bs%3A8%3A%22sumGross%22%3Bd%3A96.7999999999999971578290569595992565155029296875%3Bs%3A7%3A%22vatRate%22%3Bd%3A21%3Bs%3A3%3A%22vat%22%3Bd%3A16.800000000000000710542735760100185871124267578125%3Bs%3A6%3A%22vatSum%22%3Bd%3A16.800000000000000710542735760100185871124267578125%3Bs%3A4%3A%22hash%22%3Bs%3A40%3A%2294d8e389a9617f0adc2cfedb6e0e102155f4ec2f%22%3B%7D%7D'
   11     1        INIT_FCALL                                               'var_dump'
          2        INIT_FCALL                                               'mb_unserialize'
          3        SEND_VAR                                                 !0
          4        DO_FCALL                                      0  $2      
          5        SEND_VAR                                                 $2
          6        DO_ICALL                                                 
          7      > RETURN                                                   1

Function mb_unserialize:
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/nZ7rF
function name:  mb_unserialize
number of ops:  12
compiled vars:  !0 = $string
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   RECV                                             !0      
    3     1        INIT_FCALL                                               'preg_replace'
          2        SEND_VAL                                                 '%21s%3A%28%5Cd%2B%29%3A%22%28.%2A%3F%29%22%3B%21se'
          3        SEND_VAL                                                 '%27s%3A%27.strlen%28%27%242%27%29.%27%3A%22%242%22%3B%27'
          4        SEND_VAR                                                 !0
          5        DO_ICALL                                         $1      
          6        ASSIGN                                                   !0, $1
    4     7        INIT_FCALL                                               'unserialize'
          8        SEND_VAR                                                 !0
          9        DO_ICALL                                         $3      
         10      > RETURN                                                   $3
    5    11*     > RETURN                                                   null

End of function mb_unserialize

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
169.6 ms | 1399 KiB | 20 Q