I noticed that the SHA512 algorithm yields the same output whether I input hello today or tomorrow, or if I use my computer or my sister's.
Well, yes - hash functions wouldn't be very useful if they gave different answers at times.
The classical usage for a hash function is within a signature algorithm; the core algorithm typically handles only limited sized values, and we often want to sign quite lengthy messages. So, what we do is pass our lengthy message through a hash function (to create a short value, in this case, 512 bits in length), and sign that short value. If the verifier called the hash function on the same original message, and got a different value, the verification wouldn't work.
Given the above, does this mean that knowing the above outputted hash code a priori allows me to decipher that its corresponding SHA512 input is 'hello'?
Well, what you could do is try performing SHA512 on various different inputs; if one of the inputs just happens to be 'hello', then yes, you'll see the same output, and deduce that (barring an incredible coincidence) the original input was also 'hello'.
However, that is essentially the best you can do; with a good hash function (and SHA512 is a good hash function), there is essentially no way to recover the original string (or another string that hashes to the same value) without trying various guesses.