It looks like you're manually reversing a pointer for an x64 process.
rcx+r9*8
When you see this type of operand you can assume that RCX is the address of an array, r9 is the index into the array and 8 is the size of each element. You can also assume that it's an array of pointers considering pointer size on x64 is 8 bytes. If you're reversing a game, and the pointer is for the member variable of a player object then RCX may be the entity list, which in this case is an array of player object pointers.
Sadly you will not be able to get the value of r9 unless you place a hook there or trace backwards in the code and find where r9 gets it's value. But because you probably just found the player array, the value of r9 probably doesn't matter anymore because you found something even better, the entity list.
If this is the case, find a pointer for RCX (the entity list) then you can loop through all the player objects like a boss. Could also be the virtual function table or other random array tho too