@RadyMohammed, you can do it with or without a MX at the HQ end, but for ease of administration and configuration I’d be putting an MX at the HQ end. Essentially you’ll be following this document if you have the MX at the HQ end, https://documentation.meraki.com/MX/Deployment_Guides/MPLS_Failover_to_Meraki_Auto_VPN.
If you don’t have the MX at the HQ end then you’ll manually need to configure a connection to each of the remote sites on the Fortigate. The Meraki side won’t be so hard as you can configure one set of credentials that applies to all the sites, but you’ll likely need a static IP address on each of the remote sites (so the FortiGate can confirm the device identity).
From a sizing perspective make sure the MX64 are big enough. All your traffic will pass through them onto the MPLS circuit, and if you failover to the VPN then you’ll need to be encrypting that traffic too. At the HQ end I’d be thinking you definitely need something more capable than an MX64, but that depends on the required bandwidths. Have a look here if you haven’t already, https://meraki.cisco.com/product-collateral/mx-sizing-guide/?file.
If you do implement the MX at the HQ it’s not a huge leap to go to a full SD-WAN solution, and then you can make use of the internet VPN for less latency sensitive traffic, e.g. email, so freeing up more space on those MPLS links - definitely something I’d be thinking about.
Hope this helps.