You have to capture a request in which a value is being passed in a parameter.
modify the request in the parameter and forward it via burp.
If the value at the end page modifies and you are able to successfully change the value provided by server with your own then there is a vulnerability.