Input
Supported formats: .bin, .exe, .elf, .o, .dll, .so, .dylib
Supports formats: 48 89 e5, 0x48 0x89 0xe5, 4889e5, \x48\x89\xe5
Load Example Snippet ▾
About Machine Code Disassembly
Machine code disassembly converts raw binary instructions back into human-readable assembly language. This is essential for reverse engineering, debugging, security analysis, and understanding how compiled code works.
Supported Architectures
- x86/x86-64: Intel and AMD processors (16/32/64-bit modes, Intel/AT&T syntax)
- ARM: ARM32, ARM64 (AArch64), Thumb, Cortex-M
- RISC-V: Open-source RISC instruction set (32/64-bit)
- MIPS: MIPS32, MIPS64, microMIPS
- PowerPC, SPARC, Motorola 68K: Classic architectures
Need Help with Reverse Engineering?
Our security team can perform malware analysis, firmware reverse engineering, and vulnerability research.
Frequently Asked Questions
Common questions about the Machine Code Disassembler
A disassembler converts machine code (binary instructions that CPUs execute) back into human-readable assembly language. This is essential for reverse engineering, malware analysis, vulnerability research, CTF challenges, firmware analysis, and understanding how compiled programs work.
Explore More Tools
Continue with these related tools
Password Strength Checker
Test your password strength and get recommendations for improvement
Password Generator
Generate secure random passwords with customizable options
CVE Vulnerability Search & Timeline
Search CVEs, visualize vendor trends, analyze response times, and calculate CVSS scores
CWE Lookup Tool
Look up Common Weakness Enumeration entries from MITRE with detailed mitigations and Top 25 list
SystemLens
Desktop app for filesystem analysis and security auditing with SSH scanning (macOS, Windows, Linux)
Hash Generator
Generate cryptographic hashes (MD5, SHA-256, SHA-512) for files and text. Check malware with VirusTotal integration.
⚠️ Security Notice
This tool is provided for educational and authorized security testing purposes only. Always ensure you have proper authorization before testing any systems or networks you do not own. Unauthorized access or security testing may be illegal in your jurisdiction. All processing happens client-side in your browser - no data is sent to our servers.