To some extent
A relatively common physical attack against full disk encrypted computers is the cold boot attack, which focuses on copying the contents of the RAM of a running computer, from which FDE keys and other secrets can be extracted. Cold boot attacks are of two types:
The attacker resets the system and boots onto another OS with a minimal memory footprint and copies as much data as possible from memory.
The attacker cools the RAM, removes it from the computer and plugs it into another system to analyze its contents.
TME mitigates both of these. In case of 1, the encryption engine will discard the key used to encrypt the memory when the attacker resets and boots onto another OS, so the attacker will not be able to decrypt anything. In case of 2, the attacker will not have the encryption key since the key never leaves the encryption engine, so again, they cannot decrypt anything.
However, TME is not a panacea against all physical attacks. As the answer to the question you linked to mentions, it would still be possible to attach JTAG probe to the computer. Basically, JTAG is a hardware debugger that can be attached to the motherboard and used to gain control over the CPU. Once attached, it can halt the CPU, read or modify CPU registers and access memory. This would effectively allow you to bypass the memory encryption. However, this is not as easy as a cold boot attack, since you have to buy a somewhat expensive device and sign an NDA with Intel.
TL;DR: TME raises the bar for physical attacks against a running but locked computer. It mitigates the risk of cold-boot attacks, which are a common attack vector against FDE. However, further steps would have to be taken to prevent other, more expensive attacks.