("firefox-bin" on some Linuxes, "/Applications/Firefox.app/Contents/MacOS/firefox" on Mac, etc.). This launches a Profile Manager; pick a profile that isn't being used by any other running Firefox. This avoids accidentally logging keys for normal browsing traffic, making it easier to pick out the target SSL traffic and avoiding a security risk.
Second, launch tcpdump:
tcpdump -i en0 -w dump.pcap
(where en0 is your primary Internet interface).
Browse to the site you want to debug and make some websocket requests.
Finally, you can use tshark to inspect the traffic:
The -e fields I chose there are just examples; this particular example dumps out all the websocket payloads to a file.
You can also configure Wireshark to use the log file, so that you can inspect the traffic interactively; to do so, edit Preferences -> Protocols -> SSL and set the (Pre-)Master Secret key log filename appropriately.