OP is not only asking us outsiders to speculate on MikroTik future development, he isn't saying which devices he needs these rules to work on, nor exactly what capabilities he's expecting of the rules.
ChrisCCC, the thing is, hardware offloading of firewall rules is highly dependent on the actual hardware chips in use. I don't expect any future chip to ever equal what you can achieve with a general-purpose CPU and a Linux kernel's firewall chains. If such a thing occurred, it would be a general-purpose CPU running Linux. :)
And in a sense, MikroTik has provided this: it's their higher-end routers. It's why they have so many CPU cores: to run all those firewall rules really fast.
Assuming you aren't going to replace your current router, let's get concrete and talk about specific cases. We may be able to advise you of ways to achieve some measure of hardware offloading. Switch and bridge rules are pretty powerful on their own.
This is a feature which has been requested before on this forum.
Essentially, there's a hard limitation at the moment where, when any filter rule is added, fastpath is disabled. For a basic BGP router, where pure routing is all it does, you may still want filter rules on the input chain to protect the router itself. In this scenario, even without any rules on the forward chain, fastpath is globally disabled, leaving the only option to enable connection tracking and use fasttrack. It would be nice if ROS could make a distinction between input and forward traffic and apply fastpath accordingly.
Now, it's entirely possible that this is architecturally unfeasible, or impossible, but to the best of my knowledge MT have never actually answered this question.