To be able easily read the Proguard obfuscated code, you can use the retrace script supplied with the Android SDK. In order not to provide the full path, you can add an alias. If you are using bash you can do it as follows:
alias retrace='~/ANDROID_SDK/tools/proguard/bin/retrace.sh'
If you are not using bash, then it's pretty similar. Then you just issue the retrace command.
Usage: java proguard.ReTrace [-verbose] <mapping_file> [<stacktrace_file>]