FWIW, I updated the README.md with a lot more information. I’ll summarize some key things below.
While all generally works fine with Wi-Fi adapter… it is not the quickest path. This is NOT a CHR thing, as it effects all virtualization on Mac. So wiring up a Ethernet dongle is recommend if you’re looking to see more native-like performance from the network interface. Or… if anyone wants to learn about /queue, bring up 2 x CHR images, both “bridged” to a Wi-Fi adapter, and run a /tool/bandwidth-test…you will quickly see variability. TL;DR is if you are using the Wi-Fi interface, using fq_codel queue in UTM CHR does clean up the performance somewhat.
In particular on further automation options, which I left unexplored. But the same utm:// URL scheme has a few more simple commands for automation. So you can use some
open 'utm://start?name=chr.aarch64.qemu.7.9beta4'
to start a VM. UTM’s docs are good here in describing some simple usages on macOS with Automator and Shortcuts:
https://docs.getutm.app/advanced/remote-control/
So you can in a more few steps, you can be starting/stopping CHR from Siri if desired. And the same Automator and Shortcuts can be used with the REST API to go beyond starting/stopping in those tools.
Also, it now trivial to add new UTM CHR VM configurations for download, so if anyone wants a more “customized CHR”… feel free to post the suggested configuration. I added the ROSE images to both test the “customizability”, but also it handy to not have to modify UTM setting after download.
The current images all default to “help.mikrotik.com CHR recommandation” memory of 1GB and 2 CPU cores. On a Mac Studio, you might be able to more generous. 
On licensing, I added a section in README.md about it. But they do offer a 60-day “trial” mode. So if you have/create an account at www.mikrotik.com/client, then to enable a 10Gb/s license on any CHR, the command is just:
/system/license/renew account=$myaccount password=$mypassword level=p10
and enabling it does not need a credit card or anything. @normis has pointed out the only restriction is upgrade is not allowed.
Since I think a primary use case be testing… you would not want to upgrade & likely use a new version before 60-day even. Now for long-term use, yes, you should buy a license. But I cannot see Mikrotik objecting to MORE people testing the “beta” or “rc”, or new features like “ROSE” - the later @normis is also asking folk to “test” – but how was no described. So the “ROSE” CHR image published, at least for macOS, allow someone to try the ROSE features safely. But I do not speak for Mikrotik, and not a lawyer on licensing rules.
But.. essentially, it’s one command and your password to move it from “free” to “trial” mode.
While the underlying GitHub re-packaging is as transparent as possible, It is worth repeating a previous commentary:
And to clarify this part for the “mikropkl” images:
For the chr..qemu VM downloads*, all use unmodified CHR .img files download as part of a GitHub Action. Anyone curious can see the build logs here: https://github.com/tikoci/mikropkl/actions.
For the chr..apple VM downlaods*, these use images that are originally download from Mikrotik.com, but have a script changes partitioning table (as discussed in dozen of post above). Specifically, the .apple. images on mikropkl’s GitHub, use CHR images build in another project, tikoci/fat-chr, with those build logs here: https://github.com/tikoci/fat-chr/actions
At the end of the day, a lot of trust is placed in Microsoft / GitHub, since I cannot make that more transparent than it already is… Flip side is GitHub does have various security scanning tools to look for possible supply chain attacks that are enabled in tikoci projects. And if the supply chain or other attack was within Mikrotik’s image (e.g. in their build process), nothing to be done about the risk either, nor any transparency on that process. It’s a tricky world on these things.
And as alternative, it is totally possible to build everything locally. The README.md describes how to this in Build locally on macOS section.
Please comment if anyone has idea to make the process more secure.