Does the output (PT) depend on Tag value (T)?
No it doesn't, unless you assume that returning an error is also considered output. This output is often denoted as $\bot$ in descriptions, although your reference denotes it simply as "FAIL".
In the end, the encryption used within GCM is simply counter mode encryption (CTR or SIC). The only trick is that you may need to calculate the IV for the counter mode if the nonce size is larger than 12 bytes. I've created an example decryption without verification of the tag on StackOverflow - but note that it assumes a 12 byte nonce.
If you want to have a GCM mode where the decryption is dependent on the tag you should have a look at AES-GCM-SIV mode. Here a synthetic IV (SIV) is used which doubles as authentication tag.
If you use the ciphertext before verification you are be vulnerable to bit-specific changes in the resulting plaintext (the attacker can just flip the same bit in the ciphertext). This may in turn lead to plaintext oracles which could also affect confidentiality.
Decryption without direct verification still has some limited applicability. you may want to decrypt chunks of ciphertext and put the plaintext result into a temporary file, and then copy or move the temporary file to the final location once the authentication tag has been verified. If the verification returns an error the temporary file should be destroyed.