As Daniel S notes this is certainly possible, in the sense that the math behind Shamir's secret sharing allows you to arbitrarily choose up to $k$ of the field points that the polynomial will be interpolated through (i.e. the secret and up to $k-1$ shares, or up to $k$ shares if you don't care what the secret will be), where $k$ is the threshold for reconstructing the secret.
The real question, however, is whether choosing these points (other than the secret) non-randomly is secure. And my answer would be "no, it's not."
In particular, choosing any of the $k-1$ "arbitrary" shares by any method other than independently and uniformly at random destroys the perfect secrecy property of Shamir's secret sharing. In other words, if the probability distribution from which the arbitrary shares are chosen is not uniform, an attacker may be able to derive some (probabilistic) information about the secret from observing less than $k$ shares, basically because they may have a better-than-random chance of correctly guessing the remaining shares that they have not seen.
In particular:
If we choose $1 < j ≤ k$ shares non-randomly and the remaining $k - j$ "arbitrary" shares uniformly at random, an attacker who has access to the $k - j$ random shares and can guess the $j$ non-random shares can obviously recover the secret.
Furthermore, if we generate $n > k$ shares, the attacker who correctly guesses the $j$ non-random shares only needs to gain access to any $k - j$ of the remaining $n$ shares in order to recover the secret.
If the attacker knows (or suspects) that the $j$ non-random shares belong to a restricted subset of the field elements (e.g. that their numeric value encodes a date, or that their representation in base 256 encodes ASCII text), and has access to at least $k - j$ other shares, they may use this knowledge to narrow down the possible values that the secret may have (since some secret values would correspond to impossible values for the non-random shares).
If both the secret and at least one of the shares have low entropy (as an "easily memorable" share likely has), an attacker with access to enough other shares may be able to apply techniques from classical cryptanalysis to efficiently guess both the secret and the low-entropy share, similar to e.g. exploiting one-time-pad key reuse.
I'd really like to add a practical "toy example" of cracking a secret shared with a non-random share here, but I don't really have time to work one out right now. I may amend this answer later.
I'll just generally note that e.g. if the attacker knows $k-1$ shares, the secret $s$ and the remaining share $y$ (which can be any of the remaining shares!) are related via a bijective affine map $s = ay + b$, where the coefficients $a$ and $b$ are determined by the other shares and addition and multiplication are done in the finite field used for the sharing scheme. This suggests that techniques for breaking affine ciphers ought to be generally applicable, although details may vary depending on e.g. the size of the field used.
a few short memorable shares
together with the SSS settings. – kelalaka Feb 19 '24 at 18:24