are you certain that the bootloader is on a otp (and hence not writeable) ?
exeDSP seems to have references to oneboot.bin or will it just dump it to a file ?
Do you have further insight into the booting process (oneboot -> uboot -> kernel ?) ?
Sorry for all these questions, but you seem to be quite some steps ahead and
I could sleep better a night if I understand how my TV boots to be able to
restore it in case of a brick.
One of the first things team twiizers did when hacking the Wii was to write
a custom bootloader with implemented flash dump and restore functionality
it would be great to have something similar to avoid bricking

So I think the very first thing to concentrate on is the booting-process
and they first possibility for us to intercept it (as far as I understand, most
ExLink functionality like memory writing is done through exeDSP if the
system gets bricked even ExLink won't be of much help).
After this is done, experimenting with the system will be a lot safer

cu Cyberdemon