Home/Tools/Machine Code Disassembler

Machine Code Disassembler

Convert machine code to assembly language for reverse engineering

Client-Side Processing: All disassembly is performed locally in your browser using WebAssembly. Your machine code never leaves your device.

Input

Supported formats: .bin, .exe, .elf, .o, .dll, .so, .dylib

Supports formats: 48 89 e5, 0x48 0x89 0xe5, 4889e5, \x48\x89\xe5

Load Example Snippet ▾
x86-64
ARM64
ARM32
RISC-V
x86-32

About Machine Code Disassembly

Machine code disassembly converts raw binary instructions back into human-readable assembly language. This is essential for reverse engineering, debugging, security analysis, and understanding how compiled code works.

Supported Architectures

  • x86/x86-64: Intel and AMD processors (16/32/64-bit modes, Intel/AT&T syntax)
  • ARM: ARM32, ARM64 (AArch64), Thumb, Cortex-M
  • RISC-V: Open-source RISC instruction set (32/64-bit)
  • MIPS: MIPS32, MIPS64, microMIPS
  • PowerPC, SPARC, Motorola 68K: Classic architectures

Need Help with Reverse Engineering?

Our security team can perform malware analysis, firmware reverse engineering, and vulnerability research.

Frequently Asked Questions

Common questions about the Machine Code Disassembler

A disassembler converts machine code (binary instructions that CPUs execute) back into human-readable assembly language. This is essential for reverse engineering, malware analysis, vulnerability research, CTF challenges, firmware analysis, and understanding how compiled programs work.

⚠️ Security Notice

This tool is provided for educational and authorized security testing purposes only. Always ensure you have proper authorization before testing any systems or networks you do not own. Unauthorized access or security testing may be illegal in your jurisdiction. All processing happens client-side in your browser - no data is sent to our servers.

Machine Code Disassembler - Convert Hex to Assembly | Inventive HQ