Although both TPM Physical Presence and YubiKey button share the property of confirming some operations by cryptographic means upon user action, its usage might be quite different. If from Physical Presence you are expecting real time confirmation when some signature is issued by TPM upon some user action, then this might not be the right tool.
Although the standard might give more possibilities, usual implementation of TPM PP is used to perform changes by Operating System on NVRAM/UEFI related stuff - like introducing new Machine Owner Key by OS to control how UEFI Secure Boot will behave might need entering your UEFI password on the very next boot. Physical Presence here means that without the user action the change will not be applied.
Consult section 'Physical Presence Interface Pseudo Code' of the standard. The actual implementation will always be device specific. If you would like to perform deep research start from geting UEFI firmware for your specific device and extract all modules using UEFI Tool. Then you can use IRFExtractor to search for Physical Presence specific strings. When you will locate specific module you can identify its format and use standard reverse engeneering techniques to work on it.
You can also develop own EFI module - I was actually thinking about doing so with built-in fingerprint reader in Dell XPS9310 towards implementing FIDO2 compatible interface.