Based on three decades of software engineering experience, including reverse engineering efforts, I’d say: Forget about it.
(1) Any reasonably skilled attacker will be able to reverse engineer based on the static image alone, without running the code
(2) If you think you have some secret sauce that none of the competition is using, you are probably wrong
In competitive industries, the technical lead of the top dog in the market is often just half a year worth of technological advancement. This means you need to deploy new ideas rapidly and monetize that half-year lead.