Technically, you could just include the token in the URI you pass to the browser.
But this would be insecure:
Injection of access tokens
An additional (and very dangerous) threat
occurs when clients accept access tokens from sources other than the
return call from the token endpoint. This can occur for a client that
uses the implicit flow (where the token is passed directly as a
parameter in the URL hash) and don't properly use the OAuth state
parameter. This issue can also occur if different parts of an
application pass the access token between components in order to
"share" access among them. This is problematic because it opens up a
place for access tokens to potentially be injected into an application
by an outside party (and potentially leak outside of the application).
If the client application does not validate the access token through
some mechanism, it has no way of differentiating between a valid token
and an attack token.
(Source: https://oauth.net/articles/authentication/)
It is also forbidden in the specification:
Access token credentials (as well as any confidential access token
attributes) MUST be kept confidential in transit and storage, and only
shared among the authorization server, the resource servers the access
token is valid for, and the client to whom the access token is issued.
(Source: https://www.rfc-editor.org/rfc/rfc6749#section-10.3)
So instead, you could try using an alternative OAuth flow, called "Authorization Code Flow", where instead of passing the token to the browser, the app passes a special code, which the browser then uses to obtain a token from the server.
However, your use case isn't exactly what this mechanism was created for, so I'm not sure using it to accomplish what you're after would be in line with the specification.