I do not use Veracrypt but if I wanted to follow those directions I would create a VM that had Puppy Linux installed on it as Puppy is by design entirely RAM based. It writes nothing to disk unless specifically instructed to do so at the end of the session.
However, given that this is Qubes why not simply create a separate VM with VC installed and when done with your work delete the VM. I think those directions are more for people who are not using a OS like qubes but something like Mint.
I should add that I know that Puppy supports TC 7.1a. I assume it will support VC but I have never tried it.
Qubes does not make forensics impossible. Even disposable vms or deleted vms may have traces of the fact that a hidden partition/files was accessed. There is one possible solution creating snapshot of dom0 in LVM, storing it on a separate drive that later can be destroyed :) But then again a live cd is an easier and cheaper solution.