Abstract
Blockchain, as a nascent technology, remains immature, and smart contract debugging tools don't always solve my problems. How can we achieve smooth dynamic debugging of EVM's underlying memory, stack, and bytecode? Popular tools like Foundry and Simbolik have significant limitations and don't offer the freedom we need. Kontrol, as a symbolic execution tool, is powerful but potentially overly cumbersome. Why not dig straight to the core and perform low-level debugging at the virtual machine reverse-engineering level? Let's reverse-engineer smart contract bytecode directly and transform Py-EVM into a low-level debugging powerhouse!