Frequently asked questions are here.
Q: What is the purpose of this project?
A: Getting unsigned "homebrew" code running on the Nintendo DSi in native DSi mode.
Q: Any progress?
A:The Memory Pit Exploit has been made and is now the most efficient and the easiest way to boot unsigned code, as well as stylehax, which exploits the Web Browser and is useful for those with broken Cameras who have not completed the Camera tutorial.
Q: What is the purpose of running "homebrew" code on the Nintendo DSi?
A: The Nintendo DSi is a decently powerful system that has a SD slot, 2 cameras on it and a touch screen all in a portable system great for homebrew.
Q: Why not just rely on already available flash carts for homebrew?
A: The goal here is to run our own code via a software exploit, not a hardware one. Also, some flash carts have a bad reputation. Finally, current flash carts only allow you to run DS-native homebrew, with no DSi features (such as the cameras) or increased processing power being available. Also, SD Cards for the DSi are cheaper than flash carts.
Q: How can we know DSiware title code?
A: If you mean title IDs, see the title list. If you want to download DSiWare from NUS, you can't without the ticket which isn't available on NUS.
Q: What is FATFS? /PXI
A: PXI is the TWL SDK inter-processor communication system over the FIFO. FATFS is the TWL SDK Arm7 FAT interface for NAND, SD, etc.
Q: How do you dump DSiWare?
A: You can now use GodMode9i to do that.
Q: If DSi mode hybrid games have exploit, you are able to boot from sd card, aren't you?
A: Hybrid card games do not have SD card MMC bus access. We would've used those exploits to boot from SD card ages ago if those had access.