3v4l.org

run code in 300+ PHP versions simultaneously
<?php var_dump(iconv_mime_decode('Illegal encoded-word: =?utf-8?Q?'.chr(0xA1)."?=.", ICONV_MIME_DECODE_CONTINUE_ON_ERROR));
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/vLK6m
function name:  (null)
number of ops:  9
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   INIT_FCALL                                               'var_dump'
          1        INIT_FCALL_BY_NAME                                       'iconv_mime_decode'
          2        SEND_VAL_EX                                              'Illegal+encoded-word%3A+%3D%3Futf-8%3FQ%3F%A1%3F%3D.'
          3        FETCH_CONSTANT                                   ~0      'ICONV_MIME_DECODE_CONTINUE_ON_ERROR'
          4        SEND_VAL_EX                                              ~0
          5        DO_FCALL                                      0  $1      
          6        SEND_VAR                                                 $1
          7        DO_ICALL                                                 
          8      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
160.76 ms | 1385 KiB | 18 Q