Yes, it is possible to verify secure booting without programming keys into OTP (One-Time Programmable) memory.
This can be accomplished using the SecureBoot_OpenPart Example.
The ROM code provides a method to initiate a secure boot stream in an open part, bypassing the need to write keys into OTP memory. This method allows you to validate the generated key and application stream before writing to OTP memory.
To test secure booting, load an application into memory through an emulator, utilizing the ROM API function adi_rom_Boot and a hook function. This configuration prepares the kernel for secure boot and begins the boot sequence.
For more details on the SecureBoot_OpenPart Example Project and its functionalities, please refer to application note EE-366 linked below.
https://www.analog.com/media/en/technical-documentation/application-notes/EE366v02.pdf
The associated zip file can be downloaded from below link.
https://www.analog.com/media/en/technical-documentation/application-notes/EE366v02.zip