What you are describing is a second-preimage attack on SHA-512, and you will find it quite infeasible, requiring an expected $2^{512}$ hash computations.
Now, consider your friend's position.
SHA-512 is a one-way function, and knowing part of the plaintext does not help reverse it to recover the whole plaintext from the hash.
Instead, a brute-force approach is necessary. Your friend will calculate hashes of all possible inputs matching the condition you tell him (ending with "ing"). Once he finds a match, he will conclude that he has found your string.
What does your friend know about your string? Its length? The set of characters you might use? The fact that you posted it on stackexchange? Your best hope is that your friend will not find your string, because if he does, you will be unable to lie and present another string with the same hash.