3v4l.org

run code in 300+ PHP versions simultaneously
<?php $s = '{"scope":"status_update","token_type":"bearer","expires_in":2592820,"refresh_token":"175475|0.dBTOWfA9vwzca6kHj0GoQ1gQS2zhMIT4.234958541","user":{"id":234958541,"name":"å¼ çª","avatar":[{"type":"avatar","url":"http://hdn.xnimg.cn/photos/hdn311/20090507/0735/head_oggW_61080p204236.jpg"},{"type":"tiny","url":"http://hdn.xnimg.cn/photos/hdn311/20090507/0735/tiny_Qu8V_61080p204236.jpg"},{"type":"main","url":"http://hdn.xnimg.cn/photos/hdn311/20090507/0735/main_05gG_61080p204236.jpg"},{"type":"large","url":"http://hdn.xnimg.cn/photos/hdn311/20090507/0735/large_a7L6_61090g204236.jpg"}]},"access_token":"175475|6.1d01908af172c7728e3cef7ea1a85d78.2592000.1380124800-234958541"} '; print json_decode ( $s, true );
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/o7iNa
function name:  (null)
number of ops:  7
compiled vars:  !0 = $s
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, '%7B%22scope%22%3A%22status_update%22%2C%22token_type%22%3A%22bearer%22%2C%22expires_in%22%3A2592820%2C%22refresh_token%22%3A%22175475%7C0.dBTOWfA9vwzca6kHj0GoQ1gQS2zhMIT4.234958541%22%2C%22user%22%3A%7B%22id%22%3A234958541%2C%22name%22%3A%22%C3%A5%C2%BC+%C3%A7%C2%90%C2%AA%22%2C%22avatar%22%3A%5B%7B%22type%22%3A%22avatar%22%2C%22url%22%3A%22http%3A%2F%2Fhdn.xnimg.cn%2Fphotos%2Fhdn311%2F20090507%2F0735%2Fhead_oggW_61080p204236.jpg%22%7D%2C%7B%22type%22%3A%22tiny%22%2C%22url%22%3A%22http%3A%2F%2Fhdn.xnimg.cn%2Fphotos%2Fhdn311%2F20090507%2F0735%2Ftiny_Qu8V_61080p204236.jpg%22%7D%2C%7B%22type%22%3A%22main%22%2C%22url%22%3A%22http%3A%2F%2Fhdn.xnimg.cn%2Fphotos%2Fhdn311%2F20090507%2F0735%2Fmain_05gG_61080p204236.jpg%22%7D%2C%7B%22type%22%3A%22large%22%2C%22url%22%3A%22http%3A%2F%2Fhdn.xnimg.cn%2Fphotos%2Fhdn311%2F20090507%2F0735%2Flarge_a7L6_61090g204236.jpg%22%7D%5D%7D%2C%22access_token%22%3A%22175475%7C6.1d01908af172c7728e3cef7ea1a85d78.2592000.1380124800-234958541%22%7D+'
    4     1        INIT_FCALL                                               'json_decode'
          2        SEND_VAR                                                 !0
          3        SEND_VAL                                                 <true>
          4        DO_ICALL                                         $2      
          5        ECHO                                                     $2
          6      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
150.98 ms | 1386 KiB | 15 Q